Sciweavers

7978 search results - page 1319 / 1596
» Combining shared-coin algorithms
Sort
View
ACMICEC
2006
ACM
110views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Learning inventory management strategies for commodity supply chains with customer satisfaction
In this paper, we look at a supply chain of commodity goods where customer demand is uncertain and partly based on reputation, and where raw material replenishment is uncertain in...
Jeroen van Luin, Han La Poutré, J. Will M. ...
ACSD
2004
IEEE
125views Hardware» more  ACSD 2004»
15 years 8 months ago
Comparison of Methods for Supervisory Control and Submodule Construction
Over the last 25 years, methods for supervisory control of discrete event systems and methods for submodule construction based on state machine specifications have been developed ...
Gregor von Bochmann, Bassel Daou
ASAP
2004
IEEE
141views Hardware» more  ASAP 2004»
15 years 8 months ago
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
A. Murat Fiskiran, Ruby B. Lee
127
Voted
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 8 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
AMDO
2006
Springer
15 years 8 months ago
Monocular Tracking with a Mixture of View-Dependent Learned Models
This paper considers the problem of monocular human body tracking using learned models. We propose to learn the joint probability distribution of appearance and body pose using a m...
Tobias Jaeggli, Esther Koller-Meier, Luc J. Van Go...
« Prev « First page 1319 / 1596 Last » Next »