Sciweavers

426 search results - page 61 / 86
» Run lengths and liquidity
Sort
View
WSC
2001
13 years 11 months ago
Quantile and histogram estimation
This paper discusses implementation of a sequential procedure to construct proportional half-width confidence intervals for a simulation estimator of the steady-state quantiles an...
E. Jack Chen, W. David Kelton
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 10 months ago
Color Image Compression Based On Wavelet Packet Best Tree
In Image Compression, the researchers' aim is to reduce the number of bits required to represent an image by removing the spatial and spectral redundancies. Recently discrete...
Gajanan K. Kharate, Varsha H. Patil
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
A polytime proof of correctness of the Rabin-Miller algorithm from Fermat's little theorem
Although a deterministic polytime algorithm for primality testing is now known ([4]), the Rabin-Miller randomized test of primality continues being the most efficient and widely u...
Grzegorz Herman, Michael Soltys
JCS
2008
109views more  JCS 2008»
13 years 9 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...
ALGORITHMICA
2005
149views more  ALGORITHMICA 2005»
13 years 9 months ago
Approximating Maximum Weight Cycle Covers in Directed Graphs with Weights Zero and One
A cycle cover of a graph is a spanning subgraph each node of which is part of exactly one simple cycle. A k-cycle cover is a cycle cover where each cycle has length at least k. Gi...
Markus Bläser, Bodo Manthey