Sciweavers

22193 search results - page 39 / 4439
» Multiple Restricted Multiplication
Sort
View
CSL
2003
Springer
15 years 7 months ago
Generating All Abductive Explanations for Queries on Propositional Horn Theories
Abstract. Abduction is a fundamental mode of reasoning, which has taken on increasing importance in Artificial Intelligence (AI) and related disciplines. Computing abductive expla...
Thomas Eiter, Kazuhisa Makino
ICIP
2006
IEEE
16 years 3 months ago
Multiple Description Scalar Quantization Based 3D Mesh Coding
In this paper, we address the problem of 3D Model transmission over error-prone channels using multiple description coding (MDC). The objective of MDC is to encode a source into m...
M. Oguz Bici, Gozde Bozdagi Akar
CHES
2005
Springer
83views Cryptology» more  CHES 2005»
15 years 7 months ago
Fast Truncated Multiplication for Cryptographic Applications
The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms...
Laszlo Hars
AE
2007
Springer
15 years 8 months ago
Adaptive and Assortative Mating Scheme for Evolutionary Multi-Objective Algorithms
We are interested in the role of restricted mating schemes in the context of evolutionary multi-objective algorithms. In this paper, we propose an adaptive assortative mating schem...
Khoi Le, Dario Landa Silva
CRYPTO
2003
Springer
113views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
Torus-Based Cryptography
We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other discrete log based systems including Lucas-based systems ...
Karl Rubin, Alice Silverberg