Sciweavers

1449 search results - page 281 / 290
» Self-Randomized Exponentiation Algorithms
Sort
View
127
Voted
ISQED
2002
IEEE
105views Hardware» more  ISQED 2002»
15 years 7 months ago
Measurement of Inherent Noise in EDA Tools
With advancing semiconductor technology and exponentially growing design complexities, predictability of design tools becomes an important part of a stable top-down design process...
Andrew B. Kahng, Stefanus Mantik
105
Voted
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
ICCV
2007
IEEE
16 years 4 months ago
Temporal Segmentation of Facial Behavior
Temporal segmentation of facial gestures in spontaneous facial behavior recorded in real-world settings is an important, unsolved, and relatively unexplored problem in facial imag...
Fernando De la Torre, Joan Campoy, Zara Ambadar, J...
ICDE
2009
IEEE
170views Database» more  ICDE 2009»
16 years 4 months ago
Semantics of Ranking Queries for Probabilistic Data and Expected Ranks
Abstract-- When dealing with massive quantities of data, topk queries are a powerful technique for returning only the k most relevant tuples for inspection, based on a scoring func...
Graham Cormode, Feifei Li, Ke Yi
ICDE
2005
IEEE
144views Database» more  ICDE 2005»
16 years 3 months ago
ViteX: A Streaming XPath Processing System
We present ViteX, an XPath processing system on XML streams with polynomial time complexity. ViteX uses a polynomial-space data structure to encode an exponential number of patter...
Yi Chen, Susan B. Davidson, Yifeng Zheng