Sciweavers

238 search results - page 25 / 48
» Distributed Center-Location Algorithms: Proposals and Compar...
Sort
View
CMA
2010
183views more  CMA 2010»
13 years 4 months ago
Ramanujan's class invariants and their use in elliptic curve cryptography
Complex Multiplication (CM) method is a frequently used method for the generation of elliptic curves (ECs) over a prime field Fp. The most demanding and complex step of this metho...
Elisavet Konstantinou, Aristides Kontogeorgis
TVCG
2012
192views Hardware» more  TVCG 2012»
11 years 10 months ago
Real-Time Rendering of Rough Refraction
—We present an algorithm to render objects made of transparent materials with rough surfaces in real-time, under all-frequency distant illumination. Rough surfaces cause wide sca...
Charles de Rousiers, Adrien Bousseau, Kartic Subr,...
CIS
2007
Springer
14 years 1 months ago
Mining with Noise Knowledge: Error Aware Data Mining
—Real-world data mining deals with noisy information sources where data collection inaccuracy, device limitations, data transmission and discretization errors, or man-made pertur...
Xindong Wu
IPPS
2000
IEEE
14 years 10 hour ago
Replicating the Contents of a WWW Multimedia Repository to Minimize Download Time
Dynamic replication algorithms aim at allocating, migrating and deleting copies of an object over various Internet hosts, according to the access patterns exhibited online, so as ...
Thanasis Loukopoulos, Ishfaq Ahmad
LREC
2008
90views Education» more  LREC 2008»
13 years 9 months ago
Yet another Platform for Extracting Knowledge from Corpora
The research field of "extracting knowledge bases from text collections" seems to be mature: its target and its working hypotheses are clear. In this paper we propose a ...
Francesca Fallucchi, Fabio Massimo Zanzotto