Sciweavers

473 search results - page 14 / 95
» Computing excluded minors
Sort
View
SODA
2010
ACM
261views Algorithms» more  SODA 2010»
16 years 15 days ago
Bidimensionality and Kernels
Bidimensionality theory appears to be a powerful framework in the development of meta-algorithmic techniques. It was introduced by Demaine et al. [J. ACM 2005 ] as a tool to obtai...
Fedor V. Fomin, Daniel Lokshtanov, Saket Saurabh, ...
VL
2003
IEEE
102views Visual Languages» more  VL 2003»
15 years 8 months ago
Programming for communication: overcoming motivational barriers to computation for all
Computer science as a discipline is failing to reach a diverse audience. As a result, computational illiteracy threatens many groups of underserved students—women, minorities an...
Andrea Forte
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
ARITH
2009
IEEE
15 years 10 months ago
Computation of Decimal Transcendental Functions Using the CORDIC Algorithm
In this work we propose new decimal floating-point CORDIC algorithms for transcendental function evaluation. We show how these algorithms are mapped to a state of the art Decimal...
Álvaro Vázquez, Julio Villalba, Elis...
ARCS
2004
Springer
15 years 8 months ago
Implementation and Evaluation of a Parallel-External Algorithm for Cycle Structure Computation on a PC-Cluster
Abstract: We report on our experiences with the implementation of a parallel algorithm to compute the cycle structure of a permutation given as an oracle. As a sub-problem, the cyc...
Latifa Boursas, Jörg Keller