Sciweavers

10907 search results - page 86 / 2182
» Constraint Based Strategies
Sort
View
SACRYPT
2009
Springer
176views Cryptology» more  SACRYPT 2009»
15 years 4 months ago
Optimization Strategies for Hardware-Based Cofactorization
Abstract. We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorizatio...
Daniel Loebenberger, Jens Putzka
SCALESPACE
2009
Springer
15 years 4 months ago
Geodesically Linked Active Contours: Evolution Strategy Based on Minimal Paths
The proposed method is related to parametric and geodesic active contours as well as minimal paths, in the context of image segmentation 1 . Our geodesically linked active contour ...
Julien Mille, Laurent D. Cohen
IPPS
2007
IEEE
15 years 4 months ago
A Comparison of Dag-Scheduling Strategies for Internet-Based Computing
A fundamental challenge in Internet computing (IC) is to efficiently schedule computations having complex interjob dependencies, given the unpredictability of remote machines, in...
Robert Hall, Arnold L. Rosenberg, Arun Venkatarama...
IVA
2007
Springer
15 years 4 months ago
Attention Based, Naive Strategies, for Guiding Intelligent Virtual Agents
Damien Clauzel, Claudia Roda, Laurent Ach, Beno&ic...