Sciweavers

267 search results - page 23 / 54
» his 2008
Sort
View
CRYPTOLOGIA
2007
53views more  CRYPTOLOGIA 2007»
13 years 9 months ago
Rejewski's Catalog
When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigm...
Alex Kuhl
JMM2
2008
116views more  JMM2 2008»
13 years 9 months ago
Multi-Scale Criteria for the Evaluation of Image Segmentation Algorithms
Abstract-- This paper deals with evaluation of image segmentation methods. We start with a state-of-the art of the evaluation criteria, involving a reference segmentation or not. B...
Sylvie Philipp-Foliguet, Laurent Guigues
JNW
2008
106views more  JNW 2008»
13 years 9 months ago
Optimization of Job Schedule Model Based on Grid Environment
CPU utilization, throughput, turnaround time, waiting time, and response time are the factor to influence system performance. Every system uses different scheduling algorithms to a...
Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean ...
JOC
2008
92views more  JOC 2008»
13 years 9 months ago
Cryptanalysis of ISO/IEC 9796-1
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
Don Coppersmith, Jean-Sébastien Coron, Fran...
DAM
2007
79views more  DAM 2007»
13 years 9 months ago
Necessary conditions for multistationarity in discrete dynamical systems
R. Thomas conjectured, twenty years ago, that the presence of a positive circuit in the interaction graph of a dynamical system is a necessary condition for the presence of severa...
Adrien Richard, Jean-Paul Comet