Sciweavers

789 search results - page 73 / 158
» Pushing using Compliance
Sort
View
ASIACRYPT
2006
Springer
15 years 5 months ago
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
Abstract. The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suit...
Pierrick Gaudry, T. Houtmann, D. Kohel, Christophe...
ICCS
2000
Springer
15 years 5 months ago
Extending the CG Model by Simulations
Abstract. Conceptual graphs (CGs) share with FOL a fundamental expressiveness limitation: only higher-order logics allow assertions of properties on predicates. This paper intends ...
Jean-François Baget
139
Voted
MOBISYS
2008
ACM
15 years 3 months ago
Lightweight module isolation for sensor nodes
There is an increasing tendency in sensor networks (and related networked embedded systems) to push more complexity and `intelligence' into end-nodes. This in turn leads to a ...
Nirmal Weerasinghe, Geoff Coulson
ICINCO
2008
174views Robotics» more  ICINCO 2008»
15 years 2 months ago
Trilateration Localization for Multi-robot Teams
The ability of robots to quickly and accurately localize their neighbors is extremely important for robotic teams. Prior approaches typically rely either on global information prov...
Paul M. Maxim, Suranga Hettiarachchi, William M. S...
NIPS
2008
15 years 2 months ago
Empirical performance maximization for linear rank statistics
The ROC curve is known to be the golden standard for measuring performance of a test/scoring statistic regarding its capacity of discrimination between two populations in a wide v...
Stéphan Clémençon, Nicolas Va...