Sciweavers

2652 search results - page 183 / 531
» Privacy-preserving linear programming
Sort
View
SIAMJO
2008
114views more  SIAMJO 2008»
15 years 3 months ago
An Inexact SQP Method for Equality Constrained Optimization
We present an algorithm for large-scale equality constrained optimization. The method is based on a characterization of inexact sequential quadratic programming (SQP) steps that ca...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
90
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 3 months ago
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity II: A Simple Example
In a previous paper we have suggested a number of ideas to attack circuit size complexity with cohomology. As a simple example, we take circuits that can only compute the AND of t...
Joel Friedman
132
Voted
EWC
2000
106views more  EWC 2000»
15 years 3 months ago
Object Oriented Tools for Scientific Computing
A set of object oriented tools is presented which, when combined, yield an efficient parallel finite element program. Special emphasis is given to details within the concept of the...
Philippe R. B. Devloo
140
Voted
IJACTAICIT
2010
127views more  IJACTAICIT 2010»
15 years 23 days ago
New Proposed Algorithms for nth Order Butterworth Active Filter Computer-Aided Design
This paper describes new proposed algorithms for constructing the transfer function of nth order Butterworth LPF using the idea of the cascade combination of active filters. Compu...
Haider Fakher Radhi Al-Saidy
142
Voted
POPL
2000
ACM
15 years 7 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith