Sciweavers

1819 search results - page 112 / 364
» Computability and Representations of the Zero Set
Sort
View
77
Voted
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
15 years 4 months ago
An Almost Optimal Rank Bound for Depth-3 Identities
—We show that the rank of a depth-3 circuit (over any field) that is simple, minimal and zero is at most O(k3 log d). The previous best rank bound known was 2O(k2 ) (log d)k−2...
Nitin Saxena, C. Seshadhri
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
15 years 4 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
ISSAC
2007
Springer
130views Mathematics» more  ISSAC 2007»
15 years 4 months ago
On probabilistic analysis of randomization in hybrid symbolic-numeric algorithms
Algebraic randomization techniques can be applied to hybrid symbolic-numeric algorithms. Here we consider the problem of interpolating a sparse rational function from noisy values...
Erich Kaltofen, Zhengfeng Yang, Lihong Zhi
ICSOC
2005
Springer
15 years 3 months ago
A Service Oriented Architecture for Deploying and Managing Network Services
Abstract. New generation network services must be deployed and managed according to the specific customer requirements. In this context, service providers must devise a way to des...
Victor A. S. M. de Souza, Eleri Cardozo
EUROCRYPT
2008
Springer
14 years 11 months ago
Obfuscating Point Functions with Multibit Output
We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero ev...
Ran Canetti, Ronny Ramzi Dakdouk