Sciweavers

550 search results - page 68 / 110
» pairing 2009
Sort
View
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 4 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
EDBT
2009
ACM
127views Database» more  EDBT 2009»
14 years 4 months ago
Approximate substring selectivity estimation
We study the problem of estimating selectivity of approximate substring queries. Its importance in databases is ever increasing as more and more data are input by users and are in...
Hongrae Lee, Raymond T. Ng, Kyuseok Shim
GIS
2009
ACM
14 years 4 months ago
Topological relations from metric refinements
Naive Geography’s premise “Topology matters, metric refines” calls for metric properties that provide opportunities for finergrained distinctions than the purely qualitative...
Max J. Egenhofer, Matthew P. Dube
ICALP
2009
Springer
14 years 4 months ago
Qualitative Concurrent Stochastic Games with Imperfect Information
Abstract. We study a model of games that combines concurrency, imperfect information and stochastic aspects. Those are finite states games in which, at each round, the two players...
Vincent Gripon, Olivier Serre
ICSE
2009
IEEE-ACM
14 years 4 months ago
Succession: Measuring transfer of code and developer productivity
Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect ...
Audris Mockus