Sciweavers

1449 search results - page 9 / 290
» Self-Randomized Exponentiation Algorithms
Sort
View
LATINCRYPT
2010
14 years 10 months ago
Combined Implementation Attack Resistant Exponentiation
Different types of implementation attacks, like those based on side channel leakage and active fault injection, are often considered as separate threats. Countermeasures are, there...
Jörn-Marc Schmidt, Michael Tunstall, Roberto ...
116
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Distributed training of large scale exponential language models
Shrinkage-based exponential language models, such as the recently introduced Model M, have provided significant gains over a range of tasks [1]. Training such models requires a l...
Abhinav Sethy, Stanley F. Chen, Bhuvana Ramabhadra...
99
Voted
AAECC
1995
Springer
137views Algorithms» more  AAECC 1995»
15 years 4 months ago
About Approximations of Exponentials
Abstract. We look for the approximation of exp(A1 + A2) by a product in form exp(x1A1) exp(y1A2) · · · exp(xnA1) exp(ynA2). We specially are interested in minimal approximations...
Pierre-Vincent Koseleff
CP
2010
Springer
14 years 11 months ago
Exponential Propagation for Set Variables
Research on constraint propagation has primarily focused on designing polynomial-time propagators sometimes at the cost of a weaker filtering. Interestingly, the evolution of cons...
Justin Yip, Pascal Van Hentenryck
ESA
2008
Springer
108views Algorithms» more  ESA 2008»
15 years 2 months ago
Two-Stage Robust Network Design with Exponential Scenarios
Abstract. We study two-stage robust variants of combinatorial optimization problems like Steiner tree, Steiner forest, and uncapacitated facility location. The robust optimization ...
Rohit Khandekar, Guy Kortsarz, Vahab S. Mirrokni, ...