When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigm...
Abstract-- This paper deals with evaluation of image segmentation methods. We start with a state-of-the art of the evaluation criteria, involving a reference segmentation or not. B...
CPU utilization, throughput, turnaround time, waiting time, and response time are the factor to influence system performance. Every system uses different scheduling algorithms to a...
Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean ...
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
R. Thomas conjectured, twenty years ago, that the presence of a positive circuit in the interaction graph of a dynamical system is a necessary condition for the presence of severa...