Sciweavers

932 search results - page 79 / 187
» Where in the Wikipedia Is That Answer
Sort
View
CRYPTO
2007
Springer
154views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
Wiener’s famous attack on RSA with d < N0.25 shows that using a small d for an efficient decryption process makes RSA completely insecure. As an alternative, Wiener proposed t...
Ellen Jochemsz, Alexander May
ISAAC
2007
Springer
100views Algorithms» more  ISAAC 2007»
14 years 3 months ago
Dynamic Distance Hereditary Graphs Using Split Decomposition
The problem of maintaining a representation of a dynamic graph as long as a certain property is satisfied has recently been considered for a number of properties. This paper prese...
Emeric Gioan, Christophe Paul
SARA
2007
Springer
14 years 3 months ago
Extensional Reasoning
Relational databases have had great industrial success in computer science, their power evidenced by theoretical analysis and widespread adoption. Often, automated theorem provers...
Timothy L. Hinrichs
STACS
2007
Springer
14 years 3 months ago
The Complexity of Unions of Disjoint Sets
This paper is motivated by the open question whether the union of two disjoint NPcomplete sets always is NP-complete. We discover that such unions retain much of the complexity of...
Christian Glaßer, Alan L. Selman, Stephen D....
AGILEDC
2006
IEEE
14 years 3 months ago
The Role of Story Cards and the Wall in XP teams: A Distributed Cognition Perspective
Much of the knowledge used within an XP team is tacit, i.e. it is hidden and intangible. Two tangible artefacts that carry information about the team’s work are the index cards ...
Helen Sharp, Hugh Robinson, Judith Segal, Dominic ...