Sciweavers

1717 search results - page 241 / 344
» A Computable Spectral Theorem
Sort
View
ANTS
2010
Springer
262views Algorithms» more  ANTS 2010»
15 years 9 months ago
Short Bases of Lattices over Number Fields
Lattices over number elds arise from a variety of sources in algorithmic algebra and more recently cryptography. Similar to the classical case of Z-lattices, the choice of a nice,...
Claus Fieker, Damien Stehlé
ATAL
2006
Springer
15 years 9 months ago
Symbolic negotiation revisited
In this paper we propose a formalism for symbolic negotiation. We regard symbolic negotiation as cooperative problem solving (CPS), which is based on symbolic reasoning and is ext...
Peep Küngas, Mihhail Matskin
ECAI
2006
Springer
15 years 9 months ago
Verification of Medical Guidelines Using Task Execution with Background Knowledge
Abstract. The use of a medical guideline can be seen as the execution of computational tasks, sequentially or in parallel, in the face of patient data. It has been shown that many ...
Arjen Hommersom, Perry Groot, Peter J. F. Lucas, M...
GECCO
2006
Springer
135views Optimization» more  GECCO 2006»
15 years 9 months ago
The no free lunch and realistic search algorithms
The No-Free-Lunch theorems (NFLTs) are criticized for being too general to be of any relevance to the real world scenario. This paper investigates, both formally and empirically, ...
Yossi Borenstein, Riccardo Poli
216
Voted
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 7 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary