Sciweavers

229 search results - page 24 / 46
» Roots of Square: Cryptanalysis of Double-Layer Square and Sq...
Sort
View
NIPS
2008
13 years 9 months ago
Online Prediction on Large Diameter Graphs
We continue our study of online prediction of the labelling of a graph. We show a fundamental limitation of Laplacian-based algorithms: if the graph has a large diameter then the ...
Mark Herbster, Guy Lever, Massimiliano Pontil
ERSA
2004
130views Hardware» more  ERSA 2004»
13 years 9 months ago
Computing Lennard-Jones Potentials and Forces with Reconfigurable Hardware
Abstract-- Technological advances have made FPGAs an attractive platform for the acceleration of complex scientific applications. These applications demand high performance and hig...
Ronald Scrofano, Viktor K. Prasanna
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
13 years 7 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
INFORMATICALT
2008
91views more  INFORMATICALT 2008»
13 years 7 months ago
Lloyd-Max's Algorithm Implementation in Speech Coding Algorithm Based on Forward Adaptive Technique
In this paper a detail analysis of speech coding algorithm based on forward adaptive technique is carried out. We consider an algorithm that works on frame-by-frame basis, where a ...
Jelena Nikolic, Zoran Peric
CACM
2000
94views more  CACM 2000»
13 years 7 months ago
Abstract Class Hierarchies, Factories, and Stable Designs
Class Hierarchies, Factories, and Stable Designs M uch of the debate about the general aptness of class hierarchies is rooted in the different objectives taxonomists and implemente...
Friedrich Steimann