Sciweavers

980 search results - page 56 / 196
» A Sequential Reduction Strategy
Sort
View
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
CVPR
2009
IEEE
16 years 4 months ago
Rank Priors for Continuous Non-Linear Dimensionality Reduction
Non-linear dimensionality reductionmethods are powerful techniques to deal with high-dimensional datasets. However, they often are susceptible to local minima and perform poorly ...
Andreas Geiger (Karlsruhe Institute of Technology)...
CEC
2007
IEEE
15 years 4 months ago
Improving hypervolume-based multiobjective evolutionary algorithms by using objective reduction methods
— Hypervolume based multiobjective evolutionary algorithms (MOEA) nowadays seem to be the first choice when handling multiobjective optimization problems with many, i.e., at lea...
Dimo Brockhoff, Eckart Zitzler
EMSOFT
2003
Springer
15 years 3 months ago
Space Reductions for Model Checking Quasi-Cyclic Systems
Despite significant research on state-space reductions, the poor scalability of model checking for reasoning about behavioral models of large, complex systems remains the chief ob...
Matthew B. Dwyer, Robby, Xianghua Deng, John Hatcl...
ICCAD
2002
IEEE
126views Hardware» more  ICCAD 2002»
15 years 2 months ago
Robust and passive model order reduction for circuits containing susceptance elements
Numerous approaches have been proposed to address the overwhelming modeling problems that result from the emergence of magnetic coupling as a dominant performance factor for ICs a...
Hui Zheng, Lawrence T. Pileggi