Sciweavers

3657 search results - page 146 / 732
» A Study of Practical Deduplication
Sort
View
CPAIOR
2006
Springer
14 years 2 months ago
A Totally Unimodular Description of the Consistent Value Polytope for Binary Constraint Programming
Abstract. We present a theoretical study on the idea of using mathematical programming relaxations for filtering binary constraint satisfaction problems. We introduce the consisten...
Ionut D. Aron, Daniel H. Leventhal, Meinolf Sellma...
CADE
2003
Springer
14 years 11 months ago
Proof Search and Proof Check for Equational and Inductive Theorems
This paper presents on-going researches on theoretical and practical issues of combining rewriting based automated theorem proving and user-guided proof development, with the stron...
Eric Deplagne, Claude Kirchner, Hélè...
SUTC
2006
IEEE
14 years 4 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
WADS
2005
Springer
95views Algorithms» more  WADS 2005»
14 years 4 months ago
Improved Combinatorial Group Testing for Real-World Problem Sizes
We study practically efficient methods for performing combinatorial group testing. We present efficient non-adaptive and two-stage combinatorial group testing algorithms, which i...
David Eppstein, Michael T. Goodrich, Daniel S. Hir...
CCS
2004
ACM
14 years 4 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner