Sciweavers

537 search results - page 79 / 108
» A new upper bound for 3-SAT
Sort
View
IACR
2011
155views more  IACR 2011»
14 years 1 months ago
Terminating BKZ
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
107
Voted
ICS
2010
Tsinghua U.
15 years 11 months ago
Local Algorithms for Finding Interesting Individuals in Large Networks
: We initiate the study of local, sublinear time algorithms for finding vertices with extreme topological properties -- such as high degree or clustering coefficient -- in large so...
Mickey Brautbar, Michael Kearns
113
Voted
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
15 years 10 months ago
Code Placement with Selective Cache Activity Minimization for Embedded Real-time Software Design
– Many embedded system designs usually impose (hard) read-time constraints on tasks. Thus, computing a tight upper bound of the worst case execution time (WCET) of a software is ...
Junhyung Um, Taewhan Kim
ISSAC
2009
Springer
144views Mathematics» more  ISSAC 2009»
15 years 8 months ago
H-LLL: using householder inside LLL
We describe a new LLL-type algorithm, H-LLL, that relies on Householder transformations to approximate the underlying Gram-Schmidt orthogonalizations. The latter computations are ...
Ivan Morel, Damien Stehlé, Gilles Villard
ICC
2008
IEEE
150views Communications» more  ICC 2008»
15 years 8 months ago
Cooperative Transmission for Underwater Acoustic Communications
—Underwater acoustic channel usually has low data rate, long propagation delay, severe multipath effect, and time varying fading. Cooperative transmission is a new wireless commu...
Zhu Han, Yan Lindsay Sun, Hongyuan Shi