Sciweavers

3172 search results - page 142 / 635
» New developments of the Z-EDM algorithm
Sort
View
145
Voted
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
15 years 4 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
138
Voted
PPDP
2010
Springer
15 years 2 months ago
Dimensions in program synthesis
Program Synthesis, which is the task of discovering programs that realize user intent, can be useful in several scenarios: enabling people with no programming background to develo...
Sumit Gulwani
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
16 years 4 months ago
Online novelty detection on temporal sequences
: Novelty detection, or anomaly detection, on temporal sequences has increasingly attracted attention from researchers in different areas. In this paper, we present a new framework...
Junshui Ma, Simon Perkins
ALT
2008
Springer
16 years 1 months ago
Exploiting Cluster-Structure to Predict the Labeling of a Graph
Abstract. The nearest neighbor and the perceptron algorithms are intuitively motivated by the aims to exploit the “cluster” and “linear separation” structure of the data to...
Mark Herbster
ICDAR
2009
IEEE
15 years 11 months ago
Temporal Order Recovery of the Scanned Handwriting
In this paper, we present a new approach to the temporal order restoration of the off-line handwriting. After the preprocessing steps of the word image, a suitable algorithm makes...
Abdelkarim Elbaati, Monji Kherallah, Abdellatif En...