Sciweavers

8669 search results - page 98 / 1734
» Computing matrix representations
Sort
View
ICCSA
2005
Springer
14 years 2 months ago
Perturbed Hidden Matrix Cryptosystems
Abstract. We apply internal perturbation [3] to the matrix-type cryptosystems [Cn] and HM constructed in [9]. Using small instances of these variants, we investigate the existence ...
Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng ...
COLING
2010
13 years 4 months ago
Argument Optionality in the LinGO Grammar Matrix
We present a library of implemented HPSG analyses for argument optionality based on typological studies of this phenomenon in the world's languages, developed in the context ...
Safiyyah Saleem, Emily M. Bender
IWPC
2009
IEEE
14 years 3 months ago
Vector space analysis of software clones
In this paper, we introduce a technique for applying Independent Component Analysis to vector space representations of software code fragments such as methods or blocks. The dista...
Scott Grant, James R. Cordy
SC
1995
ACM
14 years 18 days ago
Parallel Matrix-Vector Product Using Approximate Hierarchical Methods
Matrix-vector products (mat-vecs) form the core of iterative methods used for solving dense linear systems. Often, these systems arise in the solution of integral equations used i...
Ananth Grama, Vipin Kumar, Ahmed H. Sameh
SIGIR
2003
ACM
14 years 2 months ago
Domain-independent text segmentation using anisotropic diffusion and dynamic programming
This paper presents a novel domain-independent text segmentation method, which identifies the boundaries of topic changes in long text documents and/or text streams. The method c...
Xiang Ji, Hongyuan Zha