Sciweavers

473 search results - page 30 / 95
» Computing excluded minors
Sort
View
IJNSEC
2011
106views more  IJNSEC 2011»
14 years 5 months ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy
103
Voted
STOC
2006
ACM
114views Algorithms» more  STOC 2006»
15 years 10 months ago
Linear time low tree-width partitions and algorithmic consequences
Classes of graphs with bounded expansion have been introduced in [15], [12]. They generalize both proper minor closed classes and classes with bounded degree. For any class with b...
Jaroslav Nesetril, Patrice Ossona de Mendez
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 7 months ago
Measuring Discrimination in Socially-Sensitive Decision Records.
Discrimination in social sense (e.g., against minorities and disadvantaged groups) is the subject of many laws worldwide, and it has been extensively studied in the social and eco...
Dino Pedreschi, Franco Turini, Salvatore Ruggieri
CICLING
2009
Springer
15 years 10 months ago
Semi-supervised Clustering for Word Instances and Its Effect on Word Sense Disambiguation
We propose a supervised word sense disambiguation (WSD) system that uses features obtained from clustering results of word instances. Our approach is novel in that we employ semi-s...
Kazunari Sugiyama, Manabu Okumura
ETFA
2008
IEEE
15 years 4 months ago
Web services on deeply embedded devices with real-time processing
Service-oriented Architectures become more and more important in connecting devices with each other. The main advantages of Service-oriented architectures er abstraction level and...
Guido Moritz, Steffen Prüter, Dirk Timmermann...