Sciweavers

1368 search results - page 31 / 274
» The Implicit Pipeline Method
Sort
View
PKC
2010
Springer
126views Cryptology» more  PKC 2010»
13 years 10 months ago
Implicit Factoring with Shared Most Significant and Middle Bits
We study the problem of integer factoring given implicit information of a special kind. The problem is as follows: let N1 = p1q1 and N2 = p2q2 be two RSA moduli of same bit-size, w...
Jean-Charles Faugère, Raphaël Marinier...
ISNN
2007
Springer
14 years 2 months ago
Hybrid Pipeline Structure for Self-Organizing Learning Array
In recent years, many efforts have been put in applying the concept of reconfigurable computing to neural networks. In our previous pursuits, an innovative self-organizing learning...
Janusz A. Starzyk, Mingwei Ding, Yinyin Liu
SAS
2010
Springer
262views Formal Methods» more  SAS 2010»
13 years 7 months ago
Concurrent Separation Logic for Pipelined Parallelization
Recent innovations in automatic parallelizing compilers are showing impressive speedups on multicore processors using shared memory with asynchronous channels. We have formulated a...
Christian J. Bell, Andrew W. Appel, David Walker
WSDM
2009
ACM
198views Data Mining» more  WSDM 2009»
14 years 3 months ago
Measuring the similarity between implicit semantic relations using web search engines
Measuring the similarity between implicit semantic relations is an important task in information retrieval and natural language processing. For example, consider the situation whe...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 1 months ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai