Sciweavers

2266 search results - page 246 / 454
» Generalizing parametric timing analysis
Sort
View
114
Voted
ECCC
2000
93views more  ECCC 2000»
15 years 18 days ago
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" element of a finite field Fp of p elements from rather short strings of...
Maria Isabel Gonzalez Vasco, Igor Shparlinski
94
Voted
MOC
2002
132views more  MOC 2002»
15 years 13 days ago
Comparison of algorithms to calculate quadratic irregularity of prime numbers
In previous work, the author has extended the concept of regular and irregular primes to the setting of arbitrary totally real number fields k0, using the values of the zeta functi...
Joshua Holden
79
Voted
SIGIR
2002
ACM
15 years 13 days ago
Using part-of-speech patterns to reduce query ambiguity
Query ambiguity is a generally recognized problem, particularly in Web environments where queries are commonly only one or two words in length. In this study, we explore one techn...
James Allan, Hema Raghavan
95
Voted
COR
2008
86views more  COR 2008»
14 years 11 months ago
Optimizing counter-terror operations: Should one fight fire with "fire" or "water"?
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within a optimal control model, ...
Jonathan P. Caulkins, Dieter Grass, Gustav Feichti...
INFOCOM
2010
IEEE
14 years 11 months ago
Delay-Based Network Utility Maximization
—It is well known that max-weight policies based on a queue backlog index can be used to stabilize stochastic networks, and that similar stability results hold if a delay index i...
Michael J. Neely