Sciweavers

2214 search results - page 174 / 443
» complexity 2004
Sort
View
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
15 years 8 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
PDCAT
2007
Springer
15 years 8 months ago
Grid Unit: A Self-Managing Building Block for Grid System
—Grid system software is inherently complex, hard to build and maintain. In this paper, we propose a selfmanaging building block: Grid Unit, which facilitates constructing Grid s...
Jianfeng Zhan, Lei Wang, Ming Zou, Hui Wang, Shuan...
GECCO
2005
Springer
118views Optimization» more  GECCO 2005»
15 years 8 months ago
The Push3 execution stack and the evolution of control
The Push programming language was developed for use in genetic and evolutionary computation systems, as the representation within which evolving programs are expressed. It has bee...
Lee Spector, Jon Klein, Maarten Keijzer
SPIRE
2005
Springer
15 years 8 months ago
XML Retrieval with a Natural Language Interface
Effective information retrieval in XML documents requires the user to have good knowledge of document structure and of some formal query language. XML query languages like XPath a...
Xavier Tannier, Shlomo Geva
143
Voted
COMPGEOM
2004
ACM
15 years 8 months ago
Computing persistent homology
We show that the persistent homology of a filtered ddimensional simplicial complex is simply the standard homology of a particular graded module over a polynomial ring. Our analy...
Afra Zomorodian, Gunnar Carlsson