Sciweavers

2449 search results - page 338 / 490
» Tensor Embedding Methods
Sort
View
CTRSA
2003
Springer
120views Cryptology» more  CTRSA 2003»
15 years 3 months ago
Simple Backdoors for RSA Key Generation
We present extremely simple ways of embedding a backdoor in the key generation scheme of RSA. Three of our schemes generate two genuinely random primes p and q of a given size, to...
Claude Crépeau, Alain Slakmon
ERCIMDL
2009
Springer
134views Education» more  ERCIMDL 2009»
15 years 2 months ago
Chance Encounters in the Digital Library
While many digital libraries focus on supporting defined tasks that require targeted searching, there is potential for enabling serendipitous discovery that can serve multiple purp...
Elaine G. Toms, Lori McCay-Peet
CC
2001
Springer
131views System Software» more  CC 2001»
15 years 2 months ago
Compiler Transformation of Pointers to Explicit Array Accesses in DSP Applications
Abstract. Efficient implementation of DSP applications are critical for embedded systems. However, current applications written in C, make extensive use of pointer arithmetic maki...
Björn Franke, Michael F. P. O'Boyle
EUROCAST
2001
Springer
189views Hardware» more  EUROCAST 2001»
15 years 2 months ago
Assertion-Based Analysis of Hybrid Systems with PVS
Abstract. Hybrid systems are a well-established mathematical model for embedded systems. Such systems, which combine discrete and continuous behavior, are increasingly used in safe...
Erika Ábrahám-Mumm, Ulrich Hannemann...
93
Voted
FSTTCS
2001
Springer
15 years 2 months ago
On Clustering Using Random Walks
Abstract. We propose a novel approach to clustering, based on deterministic analysis of random walks on the weighted graph associated with the clustering problem. The method is cen...
David Harel, Yehuda Koren