Sciweavers

892 search results - page 92 / 179
» et 2007
Sort
View
CPM
2007
Springer
134views Combinatorics» more  CPM 2007»
14 years 23 days ago
Efficient Computation of Substring Equivalence Classes with Suffix Arrays
This paper considers enumeration of substring equivalence classes introduced by Blumer et al. [1]. They used the equivalence classes to define an index structure called compact dir...
Kazuyuki Narisawa, Shunsuke Inenaga, Hideo Bannai,...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 23 days ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
GFKL
2007
Springer
137views Data Mining» more  GFKL 2007»
14 years 21 days ago
Families of Dendrograms
A conceptual framework for cluster analysis from the viewpoint of p-adic geometry is introduced by describing the space of all dendrograms for n datapoints and relating it to the m...
Patrick Erik Bradley
ICDT
2007
ACM
105views Database» more  ICDT 2007»
14 years 21 days ago
Unlocking Keys for XML Trees
Abstract. We review key constraints in the context of XML as introduced by Buneman et al. We show that one of the proposed inference rules is not sound in general, and the axiomati...
Sven Hartmann, Sebastian Link
AAAI
2007
13 years 11 months ago
Expressiveness of ADL and Golog: Functions Make a Difference
The main focus in the area of action languages, such as GOLOG, was put on expressive power, while the development in the area of action planning was focused on efficient plan gen...
Gabriele Röger, Bernhard Nebel