Sciweavers

12825 search results - page 2369 / 2565
» Improved PLSOM algorithm
Sort
View
130
Voted
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
129
Voted
DAC
2006
ACM
15 years 7 months ago
Steiner network construction for timing critical nets
Conventionally, signal net routing is almost always implemented as Steiner trees. However, non-tree topology is often superior on timing performance as well as tolerance to open f...
Shiyan Hu, Qiuyang Li, Jiang Hu, Peng Li
136
Voted
DEXA
2006
Springer
190views Database» more  DEXA 2006»
15 years 7 months ago
High-Dimensional Similarity Search Using Data-Sensitive Space Partitioning
Abstract. Nearest neighbor search has a wide variety of applications. Unfortunately, the majority of search methods do not scale well with dimensionality. Recent efforts have been ...
Sachin Kulkarni, Ratko Orlandic
156
Voted
ECAI
2006
Springer
15 years 7 months ago
Semantic Tree Kernels to Classify Predicate Argument Structures
Recent work on Semantic Role Labeling (SRL) has shown that syntactic information is critical to detect and extract predicate argument structures. As syntax is expressed by means of...
Alessandro Moschitti, Bonaventura Coppola, Daniele...
128
Voted
FLOPS
2006
Springer
15 years 7 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
« Prev « First page 2369 / 2565 Last » Next »