Sciweavers

363 search results - page 39 / 73
» Code Generation for Polynomial Multiplication
Sort
View
DEXA
1995
Springer
126views Database» more  DEXA 1995»
13 years 11 months ago
A Heuristic Approach for Optimization of Path Expressions
Abstract. The object-oriented database management systems store references to objects (implicit joins, precomputed joins), and use path expressions in query languages. One way of e...
Cetin Ozkan, Asuman Dogac, Cem Evrendilek
ESOP
1999
Springer
13 years 12 months ago
An Idealized MetaML: Simpler, and More Expressive
MetaML is a multi-stage functional programming language featuring three constructs that can be viewed as statically-typed refinements of the back-quote, comma, and eval of Scheme....
Eugenio Moggi, Walid Taha, Zine-El-Abidine Benaiss...
GECCO
2005
Springer
159views Optimization» more  GECCO 2005»
14 years 1 months ago
Resource-limited genetic programming: the dynamic approach
Resource-Limited Genetic Programming is a bloat control technique that imposes a single limit on the total amount of resources available to the entire population, where resources ...
Sara Silva, Ernesto Costa
CRYPTO
2001
Springer
116views Cryptology» more  CRYPTO 2001»
14 years 3 days ago
Nonlinear Vector Resilient Functions
An (n, m, k)-resilient function is a function f : Fn 2 → Fm 2 such that every possible output m-tuple is equally likely to occur when the values of k arbitrary inputs are fixed ...
Jung Hee Cheon
CJ
2006
123views more  CJ 2006»
13 years 7 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...