Sciweavers

6897 search results - page 247 / 1380
» Parallelization of Modular Algorithms
Sort
View
98
Voted
ICANN
2005
Springer
15 years 8 months ago
SOM of SOMs: Self-organizing Map Which Maps a Group of Self-organizing Maps
This paper aims to propose an extension of SOMs called an “SOM of SOMs,” or SOM¾ , in which the mapped objects are self-organizing maps themselves. In SOM¾ , each nodal unit ...
Tetsuo Furukawa
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 8 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
94
Voted
ICRA
2003
IEEE
114views Robotics» more  ICRA 2003»
15 years 8 months ago
Experiments in nonsmooth control of distributed manipulation
— This paper describes an experimental modular distributed manipulation system upon which one can implement a variety of control schemes. We have shown elsewhere that when one in...
Todd D. Murphey, Joel W. Burdick, J. Burgess, A. H...
128
Voted
SIGSOFT
1994
ACM
15 years 6 months ago
A New Model of Program Dependences for Reverse Engineering
A dependence model for reverse engineering should treat procedures in a modular fashion and should be fine-grained, distinguishing dependences that are due to different variables....
Daniel Jackson, Eugene J. Rollins
102
Voted
EUROCRYPT
2006
Springer
15 years 6 months ago
VSH, an Efficient and Provable Collision-Resistant Hash Function
Abstract. We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant assuming the hardness of finding nontrivial modular square roots of ver...
Scott Contini, Arjen K. Lenstra, Ron Steinfeld