Sciweavers

771 search results - page 115 / 155
» What is situated evolution
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
14 years 1 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong
ICS
2000
Tsinghua U.
14 years 1 months ago
Characterizing processor architectures for programmable network interfaces
The rapid advancements of networking technology have boosted potential bandwidth to the point that the cabling is no longer the bottleneck. Rather, the bottlenecks lie at the cros...
Patrick Crowley, Marc E. Fiuczynski, Jean-Loup Bae...
SC
2000
ACM
14 years 1 months ago
Efficient Wire Formats for High Performance Computing
High performance computing is being increasingly utilized in non-traditional circumstances where it must interoperate with other applications. For example, online visualization is...
Fabián E. Bustamante, Greg Eisenhauer, Kars...
IPAS
2007
14 years 12 days ago
Edge and corner preserving smoothing for artistic imaging
What visually distinguishes a painting from a photograph is often the absence of texture and the sharp edges: in many paintings, edges are sharper than in photographic images whil...
Giuseppe Papari, Nicolai Petkov, Patrizio Campisi