Sciweavers

1516 search results - page 22 / 304
» The Increasing Nvalue Constraint
Sort
View
85
Voted
ESAS
2005
Springer
15 years 3 months ago
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
85
Voted
KES
2004
Springer
15 years 3 months ago
Managing Ontology Evolution Via Relational Constraints
Abstract. Ontology-based modelling is becoming increasingly important in the design of complex knowledge management applications. However, many problems related to large-scale onto...
Paolo Ceravolo, Angelo Corallo, Gianluca Elia, Ant...
71
Voted
JSSPP
2001
Springer
15 years 2 months ago
Coscheduling under Memory Constraints in a NOW Environment
Networks of Workstations (NOW) have become important and cost-effective parallel platforms for scientific computations. In practice, a NOW system is heterogeneous and non-dedicat...
Francesc Giné, Francesc Solsona, Porfidio H...
77
Voted
POPL
1999
ACM
15 years 2 months ago
Constraint Systems for Useless Variable Elimination
Superfluous variables are often produced as the byproducts of program transformations, compilation, and poorly written code. These variables are irrelevant to the computational o...
Mitchell Wand, Igor Siveroni
ECP
1999
Springer
138views Robotics» more  ECP 1999»
15 years 1 months ago
Numeric State Variables in Constraint-Based Planning
We extend a planning algorithm to cover simple forms of arithmetics. The operator preconditions can refer to the values of numeric variables and the operator postconditions can mod...
Jussi Rintanen, Hartmut Jungholt