Sciweavers

2799 search results - page 449 / 560
» computing 1998
Sort
View
ICISC
1998
87views Cryptology» more  ICISC 1998»
15 years 3 months ago
Rabin and RSA analogues based on non-maximal imaginary quadratic orders
Abstract. In 14] and 21] there are proposed ElGamal-type cryptosystems based on non-maximal imaginary quadratic orders with fast trapdoor decryption. The trapdoor information is th...
Detlef Hühnlein, Andreas Meyer, Tsuyoshi Taka...
NIPS
2000
15 years 3 months ago
Text Classification using String Kernels
We propose a novel approach for categorizing text documents based on the use of a special kernel. The kernel is an inner product in the feature space generated by all subsequences...
Huma Lodhi, John Shawe-Taylor, Nello Cristianini, ...
WSC
1998
15 years 3 months ago
LABATCH.2: Software for Statistical Analysis of Simulation Sample Path Data
LABATCH.2 is a collection of computer programs available in C, FORTRAN, and SIMSCRIPT II.5 by anonymous ftp, at http://www.or.unc.edu/gfish/labatch.2.html. It performs statistical...
George S. Fishman
109
Voted
WSC
1998
15 years 3 months ago
Making Simulation more Accessible in Manufacturing Systems through a 'four phase' Approach
This paper will describe an approach to the development of computer simulations - the 'four phase' approach - which aims to be more accessible than established approache...
Hamad I. Odhabi, Ray J. Paul, Robert D. Macredie
CGF
1998
127views more  CGF 1998»
15 years 2 months ago
Getting Rid of Links in Hierarchical Radiosity
Hierarchical radiosity with clustering has positioned itself as one of the most efficient algorithms for computing global illumination in non-trivial environments. However, using...
Marc Stamminger, Hartmut Schirmacher, Philipp Slus...