Sciweavers

22193 search results - page 39 / 4439
» Multiple Restricted Multiplication
Sort
View
CSL
2003
Springer
14 years 1 months ago
Generating All Abductive Explanations for Queries on Propositional Horn Theories
Abstract. Abduction is a fundamental mode of reasoning, which has taken on increasing importance in Artificial Intelligence (AI) and related disciplines. Computing abductive expla...
Thomas Eiter, Kazuhisa Makino
ICIP
2006
IEEE
14 years 10 months ago
Multiple Description Scalar Quantization Based 3D Mesh Coding
In this paper, we address the problem of 3D Model transmission over error-prone channels using multiple description coding (MDC). The objective of MDC is to encode a source into m...
M. Oguz Bici, Gozde Bozdagi Akar
CHES
2005
Springer
83views Cryptology» more  CHES 2005»
14 years 2 months ago
Fast Truncated Multiplication for Cryptographic Applications
The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms...
Laszlo Hars
AE
2007
Springer
14 years 2 months ago
Adaptive and Assortative Mating Scheme for Evolutionary Multi-Objective Algorithms
We are interested in the role of restricted mating schemes in the context of evolutionary multi-objective algorithms. In this paper, we propose an adaptive assortative mating schem...
Khoi Le, Dario Landa Silva
CRYPTO
2003
Springer
113views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Torus-Based Cryptography
We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other discrete log based systems including Lucas-based systems ...
Karl Rubin, Alice Silverberg