Sciweavers

1301 search results - page 88 / 261
» Bounded Version Vectors
Sort
View
103
Voted
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
15 years 4 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
ENTCS
2008
80views more  ENTCS 2008»
15 years 3 months ago
Boundedness of the Domain of Definition is Undecidable for Polynomial ODEs
Consider the initial-value problem with computable parameters dx dt = p(t, x) x(t0) = x0, where p : Rn+1 Rn is a vector of polynomials and (t0, x0) Rn+1 . We show that the proble...
Daniel S. Graça, Jorge Buescu, Manuel Lamei...
123
Voted
COMBINATORICS
2006
107views more  COMBINATORICS 2006»
15 years 3 months ago
The Linear Complexity of a Graph
The linear complexity of a matrix is a measure of the number of additions, subtractions, and scalar multiplications required to multiply that matrix and an arbitrary vector. In th...
David L. Neel, Michael E. Orrison
94
Voted
QUESTA
2006
103views more  QUESTA 2006»
15 years 3 months ago
Heavy Tails in Multi-Server Queue
Abstract. In this paper, the asymptotic behaviour of the distribution tail of the stationary waiting time W in the GI/GI/2 FCFS queue is studied. Under subexponential-type assumpti...
Serguei Foss, Dmitry Korshunov
150
Voted
PVLDB
2010
92views more  PVLDB 2010»
15 years 2 months ago
Proximity Rank Join
We introduce the proximity rank join problem, where we are given a set of relations whose tuples are equipped with a score and a real-valued feature vector. Given a target feature...
Davide Martinenghi, Marco Tagliasacchi