Sciweavers

2079 search results - page 102 / 416
» Universality of random graphs
Sort
View
SODA
1993
ACM
85views Algorithms» more  SODA 1993»
15 years 5 months ago
On Traversing Layered Graphs On-line
The following bounds on the competitive ratios of deterministic and randomized on-line algorithms for traversing width-w layered graphs are obtained.
H. Ramesh
ACL
2009
15 years 2 months ago
Markov Random Topic Fields
Most approaches to topic modeling assume an independence between documents that is frequently violated. We present an topic model that makes use of one or more user-specified grap...
Hal Daume III
ATS
2009
IEEE
119views Hardware» more  ATS 2009»
15 years 11 months ago
Fault Diagnosis Using Test Primitives in Random Access Memories
As diagnostic testing for memory devices increasingly gains in importance, companies are looking for flexible, cost effective methods to perform diagnostics on their failing devi...
Zaid Al-Ars, Said Hamdioui
ENTCS
2007
108views more  ENTCS 2007»
15 years 4 months ago
Simulating and Compiling Code for the Sequential Quantum Random Access Machine
We present the SQRAM architecture for quantum computing, which is based on Knill’s QRAM model. We detail a suitable instruction set, which implements a universal set of quantum ...
Rajagopal Nagarajan, Nikolaos Papanikolaou, David ...
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 10 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak