Sciweavers

183 search results - page 10 / 37
» Canonical Big Operators
Sort
View
IMC
2005
ACM
14 years 3 months ago
Inferring and Debugging Path MTU Discovery Failures
If a host can send packets larger than an Internet path can forward, it relies on the timely delivery of Internet Control Message Protocol (ICMP) messages advising that the packet...
Matthew J. Luckie, Kenjiro Cho, Bill Owens
ISDA
2006
IEEE
14 years 3 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
IVCNZ
1998
13 years 11 months ago
A Survey and Evaluation of Mesh Reduction Techniques
: Large polygon meshes are a common entity in scienti c and engineering science. Polygon meshes can be used for simpli ed geometric operations such as collision detection and surfa...
Burkhard Wünsche
OSDI
2004
ACM
14 years 10 months ago
Using Magpie for Request Extraction and Workload Modelling
Tools to understand complex system behaviour are essential for many performance analysis and debugging tasks, yet there are many open research problems in their development. Magpi...
Paul Barham, Austin Donnelly, Rebecca Isaacs, Rich...
FOCS
2000
IEEE
14 years 2 months ago
Computing the Determinant and Smith Form of an Integer Matrix
A probabilistic algorithm is presented to find the determinant of a nonsingular, integer matrix. For a matrix A ¡£¢ n¤ n the algorithm requires O¥ n3¦5 ¥ logn§ 4¦5§ bit...
Wayne Eberly, Mark Giesbrecht, Gilles Villard