Sciweavers

2297 search results - page 175 / 460
» Production of Large Computer Programs
Sort
View
ISSAC
2009
Springer
150views Mathematics» more  ISSAC 2009»
15 years 9 months ago
On finding multiplicities of characteristic polynomial factors of black-box matrices
We present algorithms and heuristics to compute the characteristic polynomial of a matrix given its minimal polynomial. The matrix is represented as a black-box, i.e., by a functi...
Jean-Guillaume Dumas, Clément Pernet, B. Da...
IPPS
2007
IEEE
15 years 8 months ago
Challenges in Executing Data Intensive Biometric Workloads on a Desktop Grid
Desktop grids have traditionally focused on executing computation intensive workloads. Can they also be used to execute data-intensive workloads? To answer this question, we prese...
Christopher Moretti, Timothy C. Faltemier, Douglas...
NDSS
1999
IEEE
15 years 6 months ago
Experimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...
Michael Malkin, Thomas D. Wu, Dan Boneh
PPSN
1998
Springer
15 years 6 months ago
Parallel Evolutionary Optimisation with Constraint Propagation
Abstract. This paper describes a parallel model for a distributed memory architecture of a non traditional evolutionary computation method, which integrates constraint propagation ...
Alvaro Ruiz-Andino, Lourdes Araujo, José J....
PLDI
1997
ACM
15 years 6 months ago
Componential Set-Based Analysis
Set-based analysis is a constraint-based whole program analysis that is applicable to functional and objectoriented programming languages. Unfortunately, the analysis is useless f...
Cormac Flanagan, Matthias Felleisen