Sciweavers

1763 search results - page 184 / 353
» Dependent random choice
Sort
View
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
ECOWS
2007
Springer
14 years 2 months ago
Towards Optimized Data Fetching for Service Discovery
The advent of Service Oriented Architecture makes services the most flexible, platform-independent choice for exposing and integrating business functionality across a network. Ho...
Maciej Zaremba, Tomas Vitvar, Matthew Moran
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
14 years 2 months ago
An experimental analysis of evolution strategies and particle swarm optimisers using design of experiments
The success of evolutionary algorithms (EAs) depends crucially on finding suitable parameter settings. Doing this by hand is a very time consuming job without the guarantee to ...
Oliver Kramer, Bartek Gloger, Andreas Goebels
GFKL
2007
Springer
139views Data Mining» more  GFKL 2007»
14 years 2 months ago
The Noise Component in Model-based Cluster Analysis
The so-called noise-component has been introduced by Banfield and Raftery (1993) to improve the robustness of cluster analysis based on the normal mixture model. The idea is to ad...
Christian Hennig, Pietro Coretto
ICS
2007
Tsinghua U.
14 years 2 months ago
Tradeoff between data-, instruction-, and thread-level parallelism in stream processors
This paper explores the scalability of the Stream Processor architecture along the instruction-, data-, and thread-level parallelism dimensions. We develop detailed VLSI-cost and ...
Jung Ho Ahn, Mattan Erez, William J. Dally