Sciweavers

1568 search results - page 73 / 314
» The problem of examination questions in algorithmics
Sort
View
JAL
1998
74views more  JAL 1998»
15 years 3 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...
Daniel M. Gordon
110
Voted
ML
1998
ACM
113views Machine Learning» more  ML 1998»
15 years 3 months ago
Machine Learning for the Detection of Oil Spills in Satellite Radar Images
During a project examining the use of machine learning techniques for oil spill detection, we have encountered several essential questions that we believe deserve the attention of ...
Miroslav Kubat, Robert C. Holte, Stan Matwin
115
Voted
JCPHY
2011
86views more  JCPHY 2011»
14 years 7 months ago
A numerical scheme for particle-laden thin film flow in two dimensions
The physics of particle-laden thin film flow is not fully understood, and recent experiments have raised questions with current theory. There is a need for fully two-dimensional...
Matthew R. Mata, Andrea L. Bertozzi
IMC
2004
ACM
15 years 9 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
VLDB
1999
ACM
145views Database» more  VLDB 1999»
15 years 8 months ago
DBMSs on a Modern Processor: Where Does Time Go?
Recent high-performance processors employ sophisticated techniques to overlap and simultaneously execute multiple computation and memory operations. Intuitively, these techniques ...
Anastassia Ailamaki, David J. DeWitt, Mark D. Hill...