Sciweavers

1477 search results - page 203 / 296
» Complexity of (iterated) dominance
Sort
View
FSE
2007
Springer
103views Cryptology» more  FSE 2007»
14 years 5 months ago
Improved Slide Attacks
Abstract. The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on ...
Eli Biham, Orr Dunkelman, Nathan Keller
VTC
2006
IEEE
100views Communications» more  VTC 2006»
14 years 5 months ago
List Stack Detection with Reduced Search Space for MIMO Communication Systems
The interest in near-ML detection algorithms for Multiple-Input/lMultiple-Output (MIMO) systems have always been high due to their drastic performance gain over suboptimal algorith...
Woon Hau Chin, Sumei Sun
ACMSE
2006
ACM
14 years 5 months ago
HELLAS: a specialized architecture for interactive deformable object modeling
Applications involving interactive modeling of deformable objects require highly iterative, floating-point intensive numerical simulations. As the complexity of these models incr...
Shrirang M. Yardi, Benjamin Bishop, Thomas P. Kell...
VLDB
2001
ACM
108views Database» more  VLDB 2001»
14 years 3 months ago
Potter's Wheel: An Interactive Data Cleaning System
Cleaning data of errors in structure and content is important for data warehousing and integration. Current solutions for data cleaning involve many iterations of data “auditing...
Vijayshankar Raman, Joseph M. Hellerstein
KDD
1998
ACM
122views Data Mining» more  KDD 1998»
14 years 3 months ago
Memory Placement Techniques for Parallel Association Mining
Many data mining tasks (e.g., Association Rules, Sequential Patterns) use complex pointer-based data structures (e.g., hash trees) that typically suffer from sub-optimal data loca...
Srinivasan Parthasarathy, Mohammed Javeed Zaki, We...