Sciweavers

1520 search results - page 93 / 304
» The Ring Loading Problem
Sort
View
RTA
2005
Springer
15 years 3 months ago
Proving Positive Almost-Sure Termination
Abstract In order to extend the modeling capabilities of rewriting systems, it is rather natural to consider that the firing of rules can be subject to some probabilistic laws. Co...
Olivier Bournez, Florent Garnier
INFOCOM
2003
IEEE
15 years 3 months ago
Non-Uniform Waveband Hierarchy in Hybrid Optical Networks
Abstract— Aggregation of individual wavelengths into wavebands for their subsequent switching and routing as a single group is an attractive way for scalable and cost-efficient ...
Rauf Izmailov, Samrat Ganguly, Viktor Kleptsyn, Ai...
81
Voted
ACISP
2001
Springer
15 years 2 months ago
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
Amr M. Youssef, Guang Gong
105
Voted
APN
1999
Springer
15 years 2 months ago
Autonomous Continuous P/T Systems
Discrete event dynamic systems may have extremely large state spaces. For their analysis, it is usual to relax the description by removing the integrality constraints. Applying thi...
Laura Recalde, Enrique Teruel, Manuel Silva
ANTS
2010
Springer
250views Algorithms» more  ANTS 2010»
15 years 2 months ago
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between ellip...
David Jao, Vladimir Soukharev