Sciweavers

5344 search results - page 57 / 1069
» Privacy-Preserving Set Operations
Sort
View
ASAP
2004
IEEE
141views Hardware» more  ASAP 2004»
14 years 1 months ago
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
A. Murat Fiskiran, Ruby B. Lee
LPNMR
2004
Springer
14 years 3 months ago
Set Constraints in Logic Programming
We investigate a generalization of weight-constraint programs with stable semantics, as implemented in the ASP solver smodels. Our programs admit atoms of the form X, F where X is ...
V. Wiktor Marek, Jeffrey B. Remmel
PODS
2003
ACM
114views Database» more  PODS 2003»
14 years 10 months ago
Soft stratification for magic set based query evaluation in deductive databases
In this paper we propose a new bottom-up query evaluation method for stratified deductive databases based on the Magic Set approach. As the Magic Sets rewriting may lead to unstra...
Andreas Behrend
WDAG
2001
Springer
104views Algorithms» more  WDAG 2001»
14 years 2 months ago
A New Synchronous Lower Bound for Set Agreement
Abstract. We have a new proof of the lower bound that k-set agreement requires f/k + 1 rounds in a synchronous, message-passing model with f crash failures. The proof involves cons...
Maurice Herlihy, Sergio Rajsbaum, Mark R. Tuttle
FSS
2007
82views more  FSS 2007»
13 years 10 months ago
An empirical test of some measurement-theoretic axioms for fuzzy sets
In the previous years some authors have been elaborating on the measurementtheoretic foundations of fuzzy set theory. A well-known problem in this approach is the difficult applic...
C. Desimpelaere, Thierry Marchant