Sciweavers

842 search results - page 128 / 169
» Numerical Analysis on a Quantum Computer
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
14 years 1 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
14 years 1 months ago
Real-coded crossover as a role of kernel density estimation
This paper presents a kernel density estimation method by means of real-coded crossovers. Estimation of density algorithms (EDAs) are evolutionary optimization techniques, which d...
Jun Sakuma, Shigenobu Kobayashi
DSN
2003
IEEE
14 years 1 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
14 years 1 months ago
Intent-leveraged optimization of analog circuits via homotopy
—This paper proposes a circuit optimization approach that can ease the computational burden on the simulation-based circuit optimizers by leveraging simple design equations that ...
Metha Jeeradit, Jaeha Kim, Mark Horowitz
FOCS
2002
IEEE
14 years 29 days ago
The Partition Technique for Overlays of Envelopes
We obtain a near-tight bound of O(n3+ε ), for any ε > 0, on the complexity of the overlay of the minimization diagrams of two collections of surfaces in four dimensions. This...
Vladlen Koltun, Micha Sharir