Sciweavers

2316 search results - page 134 / 464
» The many forms of hypercomputation
Sort
View
ASIACRYPT
1999
Springer
15 years 9 months ago
How to Prove That a Committed Number Is Prime
Abstract. The problem of proving a number is of a given arithmetic format with some prime elements, is raised in RSA undeniable signature, group signature and many other cryptograp...
Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
EMMCVPR
1999
Springer
15 years 9 months ago
Auxiliary Variables for Markov Random Fields with Higher Order Interactions
Markov Random Fields are widely used in many image processing applications. Recently the shortcomings of some of the simpler forms of these models have become apparent, and models ...
Robin D. Morris
RSP
1999
IEEE
15 years 9 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
FSE
1999
Springer
101views Cryptology» more  FSE 1999»
15 years 9 months ago
Mod n Cryptanalysis, with Applications Against RC5P and M6
We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security. We dem...
John Kelsey, Bruce Schneier, David Wagner
VL
1999
IEEE
102views Visual Languages» more  VL 1999»
15 years 9 months ago
Visual Music in a Visual Programming Language
Sonnet was designed as a visual language for implementing real-time processes. Early design and development of behavioral components has largely focused on the domain of music pro...
Fred L. Collopy, Robert M. Fuhrer, David H. Jameso...