Sciweavers

2766 search results - page 227 / 554
» Algorithms for trigonometric polynomials
Sort
View
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May
152
Voted
CASC
2007
Springer
114views Mathematics» more  CASC 2007»
15 years 9 months ago
Analytic Solutions of Linear Difference Equations, Formal Series, and Bottom Summation
We consider summation of consecutive values (v), (v +1), . . . , (w) of a meromorphic function (z) where v, w ZZ. We assume that (z) satisfies a linear difference equation L(y) = ...
Sergei A. Abramov, Marko Petkovsek
ACL
1990
15 years 6 months ago
The Computational Complexity of Avoiding Conversational Implicatures
Referring expressions and other object descriptions should be maximal under the Local Brevity, No Unnecessary Components, and Lexical Preference preference rules; otherwise, they ...
Ehud Reiter
DAM
2006
79views more  DAM 2006»
15 years 5 months ago
Edge ranking of weighted trees
: In this paper we consider the edge ranking problem of weighted trees. We prove that a special instance of this problem, namely edge ranking of multitrees is NP-hard already for m...
Dariusz Dereniowski
EOR
2007
99views more  EOR 2007»
15 years 5 months ago
Learning lexicographic orders
The purpose of this paper is to learn the order of criteria of lexicographic decision under various reasonable assumptions. We give a sample evaluation and an oracle based algorit...
József Dombi, Csanád Imreh, Ná...