Sciweavers

575 search results - page 77 / 115
» A Note on Karr's Algorithm
Sort
View
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
14 years 11 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
JIIS
2006
103views more  JIIS 2006»
14 years 11 months ago
Time-focused clustering of trajectories of moving objects
Spatio-temporal, geo-referenced datasets are growing rapidly, and will be more in the near future, due to both technological and social/commercial reasons. From the data mining vie...
Mirco Nanni, Dino Pedreschi
CAGD
2004
121views more  CAGD 2004»
14 years 11 months ago
A conjecture on tangent intersections of surface patches
This note conjectures that if two surface patches intersect with G1 continuity along an entire curve, the probability is one that the curve is rational. This idea has significance...
Thomas W. Sederberg, Jianmin Zheng, Xiaowen Song
ISCI
2000
92views more  ISCI 2000»
14 years 11 months ago
Quantum associative memory
This paper combines quantum computation with classical neural network theory to produce a quantum computational learning algorithm. Quantum computation uses microscopic quantum lev...
Dan Ventura, Tony R. Martinez
RAID
2010
Springer
14 years 9 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter