Sciweavers

886 search results - page 28 / 178
» Generalized Bezout Identity
Sort
View
FOCS
2008
IEEE
14 years 4 months ago
Arithmetic Circuits: A Chasm at Depth Four
We show that proving exponential lower bounds on depth four arithmetic circuits imply exponential lower bounds for unrestricted depth arithmetic circuits. In other words, for expo...
Manindra Agrawal, V. Vinay
ACSAC
2002
IEEE
14 years 2 months ago
Detecting and Defending against Web-Server Fingerprinting
Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered v...
Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
FOCS
1994
IEEE
14 years 1 months ago
Fast and Lean Self-Stabilizing Asynchronous Protocols
We consrder asynchronous general topology dynamic networks of identical nameless nodes wzth worst-case transient faults. Starting from any faulty configuration, our protocols self...
Gene Itkis, Leonid A. Levin
AAECC
1993
Springer
94views Algorithms» more  AAECC 1993»
14 years 1 months ago
Relations Among Lie Formal Series and Construction of Symplectic Integrators
Symplectic integrators are numerical integration schemes for hamiltonian systems. The integration step is an explicit symplectic map. We find symplectic integrators using universa...
Pierre-Vincent Koseleff
SYNTHESE
2008
83views more  SYNTHESE 2008»
13 years 9 months ago
A relativistic Zeno effect
A Zenonian supertask involving an infinite number of identical colliding balls is generalized to include balls with different masses. Under the restriction that the total mass of a...
David Atkinson