Sciweavers

524 search results - page 81 / 105
» ets 2010
Sort
View
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
CORR
2010
Springer
162views Education» more  CORR 2010»
13 years 4 months ago
Cross-Composition: A New Technique for Kernelization Lower Bounds
We introduce a new technique for proving kernelization lower bounds, called cross-composition. A classical problem L cross-composes into a parameterized problem Q if an instance o...
Hans L. Bodlaender, Bart M. P. Jansen, Stefan Krat...
APVIS
2010
13 years 2 months ago
Visual analysis of high dimensional point clouds using topological landscapes
In this paper, we present a novel three-stage process to visualize the structure of point clouds in arbitrary dimensions. To get insight into the structure and complexity of a dat...
Patrick Oesterling, Christian Heine, Heike Jä...
COLING
2010
13 years 2 months ago
A Working Report on Statistically Modeling Dative Variation in Mandarin Chinese
Dative variation is a widely observed syntactic phenomenon in world languages (e.g. I gave John a book and I gave a book to John). It has been shown that which surface form will b...
Yao Yao, Feng-hsi Liu
ECEASST
2010
13 years 2 months ago
Navigating Across Non-Navigable Ecore References via OCL
The Eclipse Modeling Framework (EMF) and its meta-meta model Ecore support uni-directional and bi-directional references. It is quite common that references are defined uni-directi...
Martin Hanysz, Tobias Hoppe, Axel Uhl, Andreas Sei...