Sciweavers

5153 search results - page 285 / 1031
» Introduction to Randomized Algorithms
Sort
View
IPL
2008
72views more  IPL 2008»
15 years 3 months ago
Turing degrees of reals of positive effective packing dimension
A relatively longstanding question in algorithmic randomness is Jan Reimann's question whether there is a Turing cone of broken dimension. That is, is there a real A such that...
Rod Downey, Noam Greenberg
IJNSEC
2006
131views more  IJNSEC 2006»
15 years 3 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
RSA
2002
75views more  RSA 2002»
15 years 3 months ago
On the expected value of the minimum assignment
: We prove the main conjecture of the paper "On the expected value of the minimum assignment" by Marshall W. Buck, Clara S. Chan, and David P. Robbins [Random Structures ...
Marshall W. Buck, Clara S. Chan, David P. Robbins
MCS
2007
Springer
15 years 10 months ago
Cooperative Coevolutionary Ensemble Learning
Abstract. A new optimization technique is proposed for classifiers fusion — Cooperative Coevolutionary Ensemble Learning (CCEL). It is based on a specific multipopulational evo...
Daniel Kanevskiy, Konstantin Vorontsov
ICCNMC
2005
Springer
15 years 9 months ago
Improved Thumbprint and Its Application for Intrusion Detection
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
Jianhua Yang, Shou-Hsuan Stephen Huang