Sciweavers

34 search results - page 6 / 7
» Implicit Factoring: On Polynomial Time Factoring Given Only ...
Sort
View
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
14 years 17 days ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May
ICPP
2007
IEEE
14 years 1 months ago
Analyzing and Minimizing the Impact of Opportunity Cost in QoS-aware Job Scheduling
Quality of service (QoS) mechanisms allowing users to request for turn-around time guarantees for their jobs have recently generated much interest. In our previous work we had des...
Mohammad Islam, Pavan Balaji, Gerald Sabin, P. Sad...
FOCS
2010
IEEE
13 years 5 months ago
Stability Yields a PTAS for k-Median and k-Means Clustering
We consider k-median clustering in finite metric spaces and k-means clustering in Euclidean spaces, in the setting where k is part of the input (not a constant). For the k-means pr...
Pranjal Awasthi, Avrim Blum, Or Sheffet
IJCV
2010
169views more  IJCV 2010»
13 years 5 months ago
Rigid Structure from Motion from a Blind Source Separation Perspective
We present an information theoretic approach to define the problem of structure from motion (SfM) as a blind source separation one. Given that for almost all practical joint densi...
Jeff Fortuna, Aleix M. Martínez
GIS
2009
ACM
13 years 12 months ago
Conceptualization of place via spatial clustering and co-occurrence analysis
More and more users are contributing and sharing more and more contents on the Web via the use of content hosting sites and social media services. These user–generated contents ...
Dong-Po Deng, Tyng-Ruey Chuang, Rob Lemmens