Springer

Results: 3248



#Item
11Computing / Software engineering / Computer programming / Parallel computing / Graphics hardware / Object-oriented programming languages / GPGPU / Cross-platform software / CUDA / General-purpose computing on graphics processing units / AOS and SOA / Thread

Object Support in an Array-Based GPGPU Extension for Ruby Matthias Springer Hidehiko Masuhara Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Japan

Add to Reading List

Source URL: m-sp.org

Language: English - Date: 2018-09-27 01:14:42
12Algebra / Abstract algebra / XTR / Verifiable random function / Computational hardness assumptions / Group theory / Lie groups

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
13Cryptography / E-commerce / RSA / Public-key cryptography / Cryptosystem

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
14Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
15Cryptography / Zero-knowledge proof / Proof of knowledge / Malleability / Mathematical proof / Non-interactive zero-knowledge proof / Ciphertext indistinguishability / Homomorphic encryption / FiatShamir heuristic

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
16Computer vision / Feature detection / Artificial intelligence / Computational neuroscience / Scale-invariant feature transform / Structure from motion / Conference on Computer Vision and Pattern Recognition / Convolutional neural network / Speeded up robust features / Spatial verification / Artificial neural network / Random sample consensus

Structure-from-Motion using Dense CNN Features with Keypoint Relocalization

Add to Reading List

Source URL: link.springer.com

Language: English - Date: 2018-05-31 10:21:04
17Mathematics / Mathematical analysis / Algebra / Algebraic varieties / Algebraic topology / General topology / Operator theory / Projective geometry / Projective variety / Sheaf / Diffeomorphism / Local homeomorphism

manuscripta math. 136, 155–) © Springer-Verlag 2011 Julien Grivaux

Add to Reading List

Source URL: jgrivaux.perso.math.cnrs.fr

Language: English - Date: 2016-04-27 12:14:31
18Software development / Aspect-oriented software development / Aspect-oriented programming / AspectJ / Invariant / Cross-cutting concern / Pointcut

to appear in Proceedings of the Third International Conference on Generative Programming and Component Engineering (GPCE’04), Springer-Verlag LNCS, 2004. A Generative Approach to Aspect-Oriented Programming Douglas R.

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 20:41:38
19Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
UPDATE