Search
Now showing items 1-10 of 41
Merkle puzzles revisited - finding matching elements between lists
(University of Hertfordshire, 1999)
Consider the following problem. A and B have a N-element set of bit-strings. They wish to find all collisions, in other words to find the common strings of their sets or to establish that there are none. How much data must ...
A Note About the Semantics of Delegation
(ACM Press, 1999)
In many applications, mobile agents are used by a client to delegate a task. This task is usually performed by the agent on behalf of the client, by visiting various service provider's sites distributed over a network. ...
Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm
(1999)
In this paper we discuss Pantoja's construction of the Newton direction for discrete time optimal control problems. We show that automatic differentiation (AD) techniques can be used to calculate the Newton direction ...
Delegation and not-so smart cards
(1999)
We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are ...
Binding bit patterns to real world entities
(1998)
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to ...
Reverse accumulation and implicit functions
(1998)
We begin by introducing a simple technique for using reverse accumulation the first derivatives of target functions which include in their construction the solution of systems of linear or nonlinear equations. In the linear ...
Reverse differentiation and the inverse diffusion problem
(1997-06)
In this paper the task of solving the inverse photon diffusion problem in human tissue will be discussed. In such problems the optical properties of the tissue are to be determined from a knowledge of measured values of ...
A superscalar architecture to exploit instruction level parallelism
(1997-03-17)
If a high-performance superscalar processor is to realise its full potential, the compiler must re-order or schedule the object code at compile time. This scheduling creates groups of adjacent instructions that are independent ...