Sciweavers

1653 search results - page 202 / 331
» Directed tree-width examples
Sort
View
EUROCRYPT
2004
Springer
15 years 8 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
DAGM
2006
Springer
15 years 8 months ago
Diffusion-Like Reconstruction Schemes from Linear Data Models
In this paper we extend anisotropic diffusion with a diffusion tensor to be applicable to data that is well modeled by linear models. We focus on its variational theory, and invest...
Hanno Scharr
IDEAL
2000
Springer
15 years 8 months ago
Quantization of Continuous Input Variables for Binary Classification
Quantization of continuous variables is important in data analysis, especially for some model classes such as Bayesian networks and decision trees, which use discrete variables. Of...
Michal Skubacz, Jaakko Hollmén
ACM
1995
15 years 8 months ago
Characteristics of Modern System Implementation Languages
: Systems are written in systems implementation languages. What characterizes such languages in the mid-1990’s? This paper identifies the typical environment that a system is bei...
Judy M. Bishop, R. Faria
CPM
1995
Springer
139views Combinatorics» more  CPM 1995»
15 years 8 months ago
Pattern-Matching for Strings with Short Descriptions
We consider strings which are succinctly described. The description is in terms of straight-line programs in which the constants are symbols and the only operation is the concaten...
Marek Karpinski, Wojciech Rytter, Ayumi Shinohara