Sciweavers

3443 search results - page 23 / 689
» More Algebras for Determiners
Sort
View
IACR
2011
124views more  IACR 2011»
12 years 7 months ago
Using the Cloud to Determine Key Strengths
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the mos...
Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Ni...
VLDB
1994
ACM
128views Database» more  VLDB 1994»
14 years 17 hour ago
An Algebraic Approach to Rule Analysis in Expert Database Systems
Expert database systems extend the functionality of conventional database systems by providing a facility for creating and automatically executing Condition-Action rules. While Con...
Elena Baralis, Jennifer Widom
AAECC
1998
Springer
167views Algorithms» more  AAECC 1998»
13 years 7 months ago
Generalized Bezout Identity
We describe a new approach of the generalized Bezout identity for linear time-varying ordinary differential control systems. We also explain when and how it can be extended to line...
J. F. Pommaret, Alban Quadrat
ICIP
1998
IEEE
14 years 9 months ago
Complex Representations of Algebraic Curves
In this work, we employ a complex representation for an algebraic curve, and illustrate how the algebraic transformation which relates two Euclidean equivalent curves can be deter...
Mustafa Unel, William A. Wolovich
IJCAI
1989
13 years 9 months ago
An Algebraic Approach to Constraint Satisfaction Problems
A constraint satisfaction problem, or CSP, can be reformulated as an integer linear programming problem. The reformulated problem can be solved via polynomial multiplication. If t...
Igor Rivin, Ramin Zabih