Sciweavers

689 search results - page 59 / 138
» The multithreaded version of FORM
Sort
View
AIIA
1991
Springer
13 years 11 months ago
Approximate Entailment
The use of approximation as a method for dealing with complex problems is a fundamental research issue in Knowledge Representation. Using approximation in symbolic AI is not strai...
Marco Cadoli, Marco Schaerf
WSC
2007
13 years 10 months ago
Low bias integrated path estimators
We consider the problem of estimating the time-average variance constant for a stationary process. A previous paper described an approach based on multiple integrations of the sim...
James M. Calvin
ASIACRYPT
2008
Springer
13 years 10 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin
FSE
2008
Springer
115views Cryptology» more  FSE 2008»
13 years 9 months ago
On the Salsa20 Core Function
In this paper, we point out some weaknesses in the Salsa20 core function that could be exploited to obtain up to 231 collisions for its full (20 rounds) version. We first find an i...
Julio César Hernández Castro, Juan M...
CGVR
2008
13 years 9 months ago
Generating Smooth Virtual Reality Maps Using 3D Building Blocks
- In this paper, we describe a 3D modeling program called RMBL3D, Realistic Maps Built like Legos, which manipulates the architectural repetition in building structures to produce ...
Bradley J. Wimpey, Walter D. Potter