Sciweavers

4714 search results - page 260 / 943
» The Complexity of Iterated Multiplication
Sort
View
172
Voted
TIT
2008
147views more  TIT 2008»
15 years 5 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
DCC
2004
IEEE
16 years 4 months ago
Efficient Bit Allocation for Dependent Video Coding
A steepest descent based bit allocation method with polynomial iteration complexity for minimizing the sum of frame distortions under a total bit rate constraint is presented for ...
Yegnaswamy Sermadevi, Sheila S. Hemami
169
Voted
ICFCA
2005
Springer
15 years 10 months ago
Lessons Learned in Applying Formal Concept Analysis to Reverse Engineering
A key difficulty in the maintenance and evolution of complex software systems is to recognize and understand the implicit dependencies that define contracts that must be respecte...
Gabriela Arévalo, Stéphane Ducasse, ...
VLDB
1998
ACM
138views Database» more  VLDB 1998»
15 years 9 months ago
TOPAZ: a Cost-Based, Rule-Driven, Multi-Phase Parallelizer
Currently the key problems of query optimization are extensibility imposed by object-relational technology, as well as query complexity caused by forthcoming applications, such as...
Clara Nippl, Bernhard Mitschang
141
Voted
CORR
2008
Springer
75views Education» more  CORR 2008»
15 years 5 months ago
Soft-Input Soft-Output Sphere Decoding
Soft-input soft-output (SISO) detection algorithms form the basis for iterative decoding. The associated computational complexity often poses significant challenges for practical r...
Christoph Studer, Helmut Bölcskei