Sciweavers

1449 search results - page 243 / 290
» Self-Randomized Exponentiation Algorithms
Sort
View
141
Voted
ICFP
2007
ACM
16 years 2 months ago
Relating complexity and precision in control flow analysis
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies ...
David Van Horn, Harry G. Mairson
157
Voted
CASES
2004
ACM
15 years 8 months ago
Analytical computation of Ehrhart polynomials: enabling more compiler analyses and optimizations
Many optimization techniques, including several targeted specifically at embedded systems, depend on the ability to calculate the number of elements that satisfy certain conditio...
Sven Verdoolaege, Rachid Seghir, Kristof Beyls, Vi...
153
Voted
ACISP
2004
Springer
15 years 8 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
120
Voted
CVPR
2007
IEEE
16 years 4 months ago
Recognizing objects by piecing together the Segmentation Puzzle
We present an algorithm that recognizes objects of a given category using a small number of hand segmented images as references. Our method first over segments an input image into...
Jianbo Shi, Timothée Cour
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 4 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...