Sciweavers

473 search results - page 14 / 95
» Computing excluded minors
Sort
View
SODA
2010
ACM
261views Algorithms» more  SODA 2010»
14 years 4 months ago
Bidimensionality and Kernels
Bidimensionality theory appears to be a powerful framework in the development of meta-algorithmic techniques. It was introduced by Demaine et al. [J. ACM 2005 ] as a tool to obtai...
Fedor V. Fomin, Daniel Lokshtanov, Saket Saurabh, ...
VL
2003
IEEE
102views Visual Languages» more  VL 2003»
14 years 20 days ago
Programming for communication: overcoming motivational barriers to computation for all
Computer science as a discipline is failing to reach a diverse audience. As a result, computational illiteracy threatens many groups of underserved students—women, minorities an...
Andrea Forte
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
14 years 28 days ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
ARITH
2009
IEEE
14 years 2 months ago
Computation of Decimal Transcendental Functions Using the CORDIC Algorithm
In this work we propose new decimal floating-point CORDIC algorithms for transcendental function evaluation. We show how these algorithms are mapped to a state of the art Decimal...
Álvaro Vázquez, Julio Villalba, Elis...
ARCS
2004
Springer
14 years 24 days ago
Implementation and Evaluation of a Parallel-External Algorithm for Cycle Structure Computation on a PC-Cluster
Abstract: We report on our experiences with the implementation of a parallel algorithm to compute the cycle structure of a permutation given as an oracle. As a sub-problem, the cyc...
Latifa Boursas, Jörg Keller