Sciweavers

164 search results - page 7 / 33
» Developing Genetic Algorithms for Boolean Matrix Factorizati...
Sort
View
TOMS
2008
120views more  TOMS 2008»
14 years 11 months ago
Families of algorithms related to the inversion of a Symmetric Positive Definite matrix
We present families of algorithms for operations related to the computation of the inverse of a Symmetric Positive Definite (SPD) matrix: Cholesky factorization, inversion of a tr...
Paolo Bientinesi, Brian C. Gunter, Robert A. van d...
101
Voted
STOC
1998
ACM
111views Algorithms» more  STOC 1998»
15 years 3 months ago
A Deterministic Strongly Polynomial Algorithm for Matrix Scaling and Approximate Permanents
We present a deterministic strongly polynomial algorithm that computes the permanent of a nonnegative n × n matrix to within a multiplicative factor of en. To this end we develop...
Nathan Linial, Alex Samorodnitsky, Avi Wigderson
88
Voted
VTC
2008
IEEE
146views Communications» more  VTC 2008»
15 years 6 months ago
A Frequency-Domain Correlation Matrix Estimation Algorithm for MIMO-OFDM Channel Estimation
— The second-order statistics of a time-domain signal are very often used in blind and semi-blind channel estimation. Considering that the received signal in MIMO-OFDM systems mi...
Feng Wan, Wei-Ping Zhu, M. N. S. Swamy
CEC
2009
IEEE
15 years 6 months ago
Bio-inspired reverse engineering of regulatory networks
— Regulatory networks are complex networks. This paper addresses the challenge of modelling these networks. The Boolean representation is chosen and supported as a representation...
Cristina Costa Santini, Gunnar Tufte, Pauline C. H...
115
Voted
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
15 years 5 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa