Sciweavers

4451 search results - page 157 / 891
» On Random Ordering Constraints
Sort
View
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
15 years 10 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames
APPROX
2008
Springer
88views Algorithms» more  APPROX 2008»
15 years 7 months ago
Limitations of Hardness vs. Randomness under Uniform Reductions
We consider (uniform) reductions from computing a function f to the task of distinguishing the output of some pseudorandom generator G from uniform. Impagliazzo and Wigderson [IW]...
Dan Gutfreund, Salil P. Vadhan
152
Voted
ICDM
2007
IEEE
157views Data Mining» more  ICDM 2007»
15 years 6 months ago
Training Conditional Random Fields by Periodic Step Size Adaptation for Large-Scale Text Mining
For applications with consecutive incoming training examples, on-line learning has the potential to achieve a likelihood as high as off-line learning without scanning all availabl...
Han-Shen Huang, Yu-Ming Chang, Chun-Nan Hsu
ISBI
2006
IEEE
16 years 5 months ago
A tightly coupled region-shape framework for 3D medical image segmentation
Most hybrid 3D segmentation methods either heuristically couple the respective algorithm or combine a true 3D with a 2D algorithm due to computational considerations. In this pape...
Rui Huang, Vladimir Pavlovic, Dimitris N. Metaxas
TIME
2005
IEEE
15 years 10 months ago
A Local Method for Prioritized Fusion of Temporal Information
Information often comes from different sources and merging these sources usually leads to the apparition of inconsistencies. Fusion is the operation which consists in restoring th...
Mahat Khelfallah, Belaid Benhamou