Sciweavers

914 search results - page 43 / 183
» Analysis of Heuristic Synergies
Sort
View
INDOCRYPT
2004
Springer
15 years 5 months ago
Exact Analysis of Montgomery Multiplication
The Montgomery multiplication is often used for an efficient implementations of public-key cryptosystems. This algorithm occasionally needs an extra subtraction in the final step,...
Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
CMS
2010
207views Communications» more  CMS 2010»
15 years 1 days ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
CORR
2008
Springer
227views Education» more  CORR 2008»
14 years 12 months ago
An experimental analysis of Lemke-Howson algorithm
We present an experimental investigation of the performance of the Lemke-Howson algorithm, which is the most widely used algorithm for the computation of a Nash equilibrium for bi...
Bruno Codenotti, Stefano De Rossi, Marino Pagan
TKDE
1998
100views more  TKDE 1998»
14 years 11 months ago
Scalability Analysis of Declustering Methods for Multidimensional Range Queries
E cient storage and retrieval of multi-attribute datasets have become one of the essential requirements for many data-intensive applications. The Cartesian product le has been kno...
Bongki Moon, Joel H. Saltz
DATE
2003
IEEE
86views Hardware» more  DATE 2003»
15 years 5 months ago
Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems
1 We present an approach to schedulability analysis for the synthesis of multi-cluster distributed embedded systems consisting of timetriggered and event-triggered clusters, interc...
Paul Pop, Petru Eles, Zebo Peng