Sciweavers

537 search results - page 79 / 108
» A new upper bound for 3-SAT
Sort
View
IACR
2011
155views more  IACR 2011»
12 years 8 months ago
Terminating BKZ
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
ICS
2010
Tsinghua U.
14 years 5 months ago
Local Algorithms for Finding Interesting Individuals in Large Networks
: We initiate the study of local, sublinear time algorithms for finding vertices with extreme topological properties -- such as high degree or clustering coefficient -- in large so...
Mickey Brautbar, Michael Kearns
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
14 years 5 months ago
Code Placement with Selective Cache Activity Minimization for Embedded Real-time Software Design
– Many embedded system designs usually impose (hard) read-time constraints on tasks. Thus, computing a tight upper bound of the worst case execution time (WCET) of a software is ...
Junhyung Um, Taewhan Kim
ISSAC
2009
Springer
144views Mathematics» more  ISSAC 2009»
14 years 3 months ago
H-LLL: using householder inside LLL
We describe a new LLL-type algorithm, H-LLL, that relies on Householder transformations to approximate the underlying Gram-Schmidt orthogonalizations. The latter computations are ...
Ivan Morel, Damien Stehlé, Gilles Villard
ICC
2008
IEEE
150views Communications» more  ICC 2008»
14 years 2 months ago
Cooperative Transmission for Underwater Acoustic Communications
—Underwater acoustic channel usually has low data rate, long propagation delay, severe multipath effect, and time varying fading. Cooperative transmission is a new wireless commu...
Zhu Han, Yan Lindsay Sun, Hongyuan Shi