Sciweavers

3395 search results - page 92 / 679
» Computational Differential Privacy
Sort
View
PERCOM
2004
ACM
15 years 9 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
ISSAC
2009
Springer
147views Mathematics» more  ISSAC 2009»
15 years 4 months ago
Fast algorithms for differential equations in positive characteristic
We address complexity issues for linear differential equations in characteristic p > 0: resolution and computation of the p-curvature. For these tasks, our main focus is on al...
Alin Bostan, Éric Schost
ISSAC
2009
Springer
141views Mathematics» more  ISSAC 2009»
15 years 4 months ago
Algorithms for regular solutions of higher-order linear differential systems
We study systems of higher-order linear differential equations having a regular singularity at the origin. Using the properties of matrix polynomials, we develop efficient method...
Moulay A. Barkatou, Thomas Cluzeau, Carole El Bach...
ISSAC
2004
Springer
67views Mathematics» more  ISSAC 2004»
15 years 3 months ago
Rational general solutions of algebraic ordinary differential equations
We give a necessary and sufficient condition for an algebraic ODE to have a rational type general solution. For an autonomous first order ODE, we give an algorithm to compute a r...
Ruyong Feng, Xiao-Shan Gao
ADCM
2007
155views more  ADCM 2007»
14 years 10 months ago
Numerical differentiation by radial basis functions approximation
Based on radial basis functions approximation, we develop in this paper a new computational algorithm for numerical differentiation. Under an a priori and an a posteriori choice r...
T. Wei, Y. C. Hon