Sciweavers

14078 search results - page 2371 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
CHES
2007
Springer
136views Cryptology» more  CHES 2007»
15 years 11 months ago
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, and the number field sieve method (NFS), the most efficient ...
Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
122
Voted
CP
2007
Springer
15 years 11 months ago
Constructive Interval Disjunction
Shaving and constructive disjunction are two main refutation principles used in constraint programming. The shaving principle allows us to compute the singleton arc-consistency (SA...
Gilles Trombettoni, Gilles Chabert
GECCO
2007
Springer
148views Optimization» more  GECCO 2007»
15 years 11 months ago
Fuzzy-UCS: preliminary results
This paper presents Fuzzy-UCS, a Michigan-style Learning Fuzzy-Classifier System designed for supervised learning tasks. Fuzzy-UCS combines the generalization capabilities of UCS...
Albert Orriols-Puig, Jorge Casillas, Ester Bernad&...
GLVLSI
2006
IEEE
126views VLSI» more  GLVLSI 2006»
15 years 11 months ago
Hardware/software partitioning of operating systems: a behavioral synthesis approach
In this paper we propose a hardware real time operating system (HW-RTOS) solution that makes use of a dedicated hardware in order to replace the standard support provided by the P...
Sathish Chandra, Francesco Regazzoni, Marcello Laj...
HAPTICS
2006
IEEE
15 years 11 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
« Prev « First page 2371 / 2816 Last » Next »