Sciweavers

2714 search results - page 164 / 543
» Approximation Schemes for Scheduling
Sort
View
AFRICACRYPT
2008
Springer
15 years 7 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
INFOCOM
1999
IEEE
15 years 5 months ago
A Fast IP Routing Lookup Scheme for Gigabit Switching Routers
One of the key design issues for the new generation IP routers is the route lookup mechanism. For each incoming IP packet, the IP routing requires to perform a longest prefix match...
Nen-Fu Huang, Shi-Ming Zhao, Jen-Yi Pan, Chi-An Su
98
Voted
JSCIC
2008
96views more  JSCIC 2008»
15 years 24 days ago
Second-Order Accurate Godunov Scheme for Multicomponent Flows on Moving Triangular Meshes
This paper presents a second-order accurate adaptive Godunov method for twodimensional (2D) compressible multicomponent flows, which is an extension of the previous adaptive movin...
Guoxian Chen, Huazhong Tang, Pingwen Zhang
TIP
1998
114views more  TIP 1998»
15 years 14 days ago
An optimal polygonal boundary encoding scheme in the rate distortion sense
—In this paper, we present fast and efficient methods for the lossy encoding of object boundaries that are given as eight-connect chain codes. We approximate the boundary by a p...
Guido M. Schuster, Aggelos K. Katsaggelos
185
Voted
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
16 years 29 days ago
A non-linear dimensionality-reduction technique for fast similarity search in large databases
To enable efficient similarity search in large databases, many indexing techniques use a linear transformation scheme to reduce dimensions and allow fast approximation. In this re...
Khanh Vu, Kien A. Hua, Hao Cheng, Sheau-Dong Lang