Sciweavers

1532 search results - page 33 / 307
» A Comparison of RESTART Implementations
Sort
View
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
14 years 2 months ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
FLAIRS
2003
14 years 8 days ago
BUC Algorithm for Iceberg Cubes: Implementation and Sensitivity Analysis
The Iceberg-Cube problem restricts the computation of the data cube to only those group-by partitions satisfying a minimum threshold condition defined on a specified measure. In t...
George E. Nasr, Celine Badr
MP
2006
73views more  MP 2006»
13 years 10 months ago
On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming
We present a primal-dual interior-point algorithm with a filter line-search method for nonlinear programming. Local and global convergence properties of this method were analyzed i...
Andreas Wächter, Lorenz T. Biegler
ISCAS
2008
IEEE
101views Hardware» more  ISCAS 2008»
14 years 5 months ago
High-performance ASIC implementations of the 128-bit block cipher CLEFIA
— In the present paper, we introduce high-performance hardware architectures for the 128-bit block cipher CLEFIA and evaluate their ASIC performances in comparison with the ISO/I...
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Ak...
SMC
2007
IEEE
113views Control Systems» more  SMC 2007»
14 years 5 months ago
Evaluation and implement of fuzzy vault scheme using indexed minutiae
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai