Sciweavers

562 search results - page 80 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
134
Voted
DAC
2006
ACM
15 years 9 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
CORR
2008
Springer
118views Education» more  CORR 2008»
15 years 3 months ago
Distributed Constrained Optimization with Semicoordinate Transformations
Recent work has shown how information theory extends conventional full-rationality game theory to allow bounded rational agents. The associated mathematical framework can be used ...
William G. Macready, David Wolpert
JCIT
2008
93views more  JCIT 2008»
15 years 3 months ago
A search quality evaluation based on objective-subjective method
Commercial search engines, especially meta-search engines was designed to retrieve the information by submitting users' queries to multiple conventional search engines and in...
Fugui Wang, Yajun Du, Qinhua Dong
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
13 years 11 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 7 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam