Sciweavers

329 search results - page 50 / 66
» A note on the Hopf-Stiefel function
Sort
View
FOCS
2000
IEEE
14 years 1 months ago
Opportunistic Data Structures with Applications
There is an upsurging interest in designing succinct data structures for basic searching problems (see [23] and references therein). The motivation has to be found in the exponent...
Paolo Ferragina, Giovanni Manzini
HPCA
1999
IEEE
14 years 28 days ago
Dynamically Exploiting Narrow Width Operands to Improve Processor Power and Performance
In general-purpose microprocessors, recent trends have pushed towards 64-bit word widths, primarily to accommodate the large addressing needs of some programs. Many integer proble...
David Brooks, Margaret Martonosi
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
14 years 25 days ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
EUROCRYPT
2000
Springer
14 years 6 days ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
TREC
2008
13 years 10 months ago
York University at TREC 2008: Blog Track
York University participated in the TREC 2008 Blog track, by introducing two opinion finding features. By initially focusing solely on the sentiment terms found in a document, usi...
Mladen Kovacevic, Xiangji Huang