Sciweavers

1728 search results - page 269 / 346
» The Size of Power Automata
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 3 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
RECOMB
2000
Springer
15 years 3 months ago
Sequencing-by-hybridization at the information-theory bound: an optimal algorithm
In a recent paper (Preparata et al., 1999) we introduced a novel probing scheme for DNA sequencing by hybridization (SBH). The new gapped-probe scheme combines natural and univers...
Franco P. Preparata, Eli Upfal
WEBDB
2000
Springer
136views Database» more  WEBDB 2000»
15 years 3 months ago
An Optimization Technique for Answering Regular Path Queries
Rewriting queries using views is a powerful technique that has applications in data integration, data warehousing and query optimization. Query rewriting in relational databases i...
Gösta Grahne, Alex Thomo
KDD
1995
ACM
167views Data Mining» more  KDD 1995»
15 years 3 months ago
Efficient Algorithms for Attribute-Oriented Induction
Data mining or knowledge discovery in databasesis the search for relationships and global patterns that exist but are hidden in large databases.Many different methodshave been pro...
Hoi-Yee Hwang, Ada Wai-Chee Fu
SIGMETRICS
1991
ACM
15 years 3 months ago
Implementing Stack Simulation for Highly-Associative Memories
Prior to this work, all implementations of stack simulation [MGS70] required more than linear time to process an address trace. In particular these implementations are often slow ...
Yul H. Kim, Mark D. Hill, David A. Wood