Sciweavers

499 search results - page 98 / 100
» Constructive Induction by Analogy
Sort
View
ICALP
2005
Springer
14 years 1 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
14 years 15 days ago
Strategic 'Morphing' and the Survivability of E-commerce Firms
Over the past year, the shakeout in the electronic commerce marketplace has redirected the attention of entrepreneurs and investors from the funding hype surrounding Internet star...
Robert J. Kauffman, Bin Wang, Tim Miller
ANTS
2000
Springer
133views Algorithms» more  ANTS 2000»
13 years 12 months ago
Lifting Elliptic Curves and Solving the Elliptic Curve Discrete Logarithm Problem
Abstract. Essentially all subexponential time algorithms for the discrete logarithm problem over nite elds are based on the index calculus idea. In proposing cryptosystems based on...
Ming-Deh A. Huang, Ka Lam Kueh, Ki-Seng Tan
PARA
1995
Springer
13 years 11 months ago
ScaLAPACK Tutorial
Abstract. ScaLAPACK is a library of high performance linear algebra routines for distributed memory MIMD computers. It is a continuation of the LAPACK project, which designed and p...
Jack Dongarra, Antoine Petitet
AAAI
2008
13 years 10 months ago
Using a Geometric-Based Sketch Recognition Approach to Sketch Chinese Radicals
Unlike English, where unfamiliar words can be queried for its meaning by typing out its letters, the analogous operation in Chinese is far from trivial due to the nature of its wr...
Paul Taele, Tracy Hammond