Sciweavers

7486 search results - page 120 / 1498
» The Limits of Quantum Computers
Sort
View
WEWORC
2007
129views Cryptology» more  WEWORC 2007»
13 years 11 months ago
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
This paper presents two key-recovery attacks against the last modication to Achterbahn-128/80 proposed by the authors at SASC 2007 due to the previous attacks. The 80-bit variant,...
María Naya-Plasencia
IJBRA
2007
89views more  IJBRA 2007»
13 years 10 months ago
Conservative adjustment of permutation p-values when the number of permutations is limited
The permutation procedure is widely used to assess the significance level (p-value) of a test statistic. This approach is asymptotically consistent. In genomics and proteomics st...
Yinglei Lai
CPHYSICS
2004
93views more  CPHYSICS 2004»
13 years 10 months ago
Modeling plasma-wall interactions in First Wall-Limiter geometry
We test the standard edge plasma code B2-solps5.0 on a model First-Wall Limiter (FWL) geometry. The presence of a tangency point between the solid wall and the magnetic separatrix...
F. Subba, R. Zanino
WWW
2006
ACM
14 years 10 months ago
Why is connectivity in developing regions expensive: policy challenges more than technical limitations?
I present analysis examining some of the causes of poor connectivity in developing countries. Based on a technoeconomic analysis and design, I show that technical limitations per ...
Rahul Tongia
QEST
2006
IEEE
14 years 4 months ago
Limiting Behavior of Markov Chains with Eager Attractors
We consider discrete infinite-state Markov chains which contain an eager finite attractor. A finite attractor is a finite subset of states that is eventually reached with prob...
Parosh Aziz Abdulla, Noomene Ben Henda, Richard Ma...