Sciweavers

1003 search results - page 82 / 201
» It's life Jim, but not as we know it!
Sort
View
APPROX
2006
Springer
121views Algorithms» more  APPROX 2006»
15 years 5 months ago
A Randomized Solver for Linear Systems with Exponential Convergence
Abstract. The Kaczmarz method for solving linear systems of equations Ax = b is an iterative algorithm that has found many applications ranging from computer tomography to digital ...
Thomas Strohmer, Roman Vershynin
CTRSA
2008
Springer
111views Cryptology» more  CTRSA 2008»
15 years 3 months ago
Efficient Fully-Simulatable Oblivious Transfer
Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant...
Andrew Y. Lindell
UAI
2003
15 years 2 months ago
Systematic vs. Non-systematic Algorithms for Solving the MPE Task
The paper explores the power of two systematic Branch and Bound search algorithms that exploit partition-based heuristics, BBBT (a new algorithm for which the heuristic informatio...
Radu Marinescu 0002, Kalev Kask, Rina Dechter
IAT
2005
IEEE
15 years 7 months ago
Multiagent Reputation Management to Achieve Robust Software Using Redundancy
This paper explains the building of robust software using multiagent reputation. One of the major goals of software engineering is to achieve robust software. Our hypothesis is th...
Rajesh Turlapati, Michael N. Huhns
SAINT
2005
IEEE
15 years 7 months ago
HAR: Hierarchy-Based Anycast Routing Protocol for Wireless Sensor Networks
In this paper, we present Hierarchy-Based Anycast Routing (HAR), a routing protocol for collecting data over multi-hop, wireless sensor networks. The design of the protocol aims t...
Niwat Thepvilojanapong, Yoshito Tobe, Kaoru Sezaki