Sciweavers

5153 search results - page 298 / 1031
» Introduction to Randomized Algorithms
Sort
View
118
Voted
ESA
2005
Springer
161views Algorithms» more  ESA 2005»
15 years 9 months ago
Cache-Oblivious Comparison-Based Algorithms on Multisets
Abstract. We study three comparison-based problems related to multisets in the cache-oblivious model: Duplicate elimination, multisorting and finding the most frequent element (th...
Arash Farzan, Paolo Ferragina, Gianni Franceschini...
MSN
2005
Springer
202views Sensor Networks» more  MSN 2005»
15 years 9 months ago
Mobility-Pattern Based Localization Update Algorithms for Mobile Wireless Sensor Networks
In mobile wireless sensor networks, sensors move in the monitored area at any direction and at any speed. Unlike many other networking hosts, sensor nodes do not have global addres...
Mohammad Al-laho, Min Song, Jun Wang
SAT
2004
Springer
131views Hardware» more  SAT 2004»
15 years 9 months ago
A Comparative Study of 2QBF Algorithms
2QBF is the problem of evaluating a Quantified Boolean Formula (QBF) with two levels of quantification. Many practical problems in sequential verification can be formulated as i...
Darsh P. Ranjan, Daijue Tang, Sharad Malik
WEA
2004
Springer
110views Algorithms» more  WEA 2004»
15 years 9 months ago
A Dynamic Algorithm for Topologically Sorting Directed Acyclic Graphs
Abstract. We consider how to maintain the topological order of a directed acyclic graph (DAG) in the presence of edge insertions and deletions. We present a new algorithm and, alth...
David J. Pearce, Paul H. J. Kelly
118
Voted
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
15 years 9 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine