Sciweavers

932 search results - page 131 / 187
» Uniform Random Number Generators
Sort
View
CAV
2009
Springer
132views Hardware» more  CAV 2009»
15 years 10 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas
ISCAS
2007
IEEE
105views Hardware» more  ISCAS 2007»
15 years 4 months ago
Stability Analysis of RED Gateway with Multiple TCP Reno Connections
— It has been observed that a bottleneck Random Early Detection (RED) gateway becomes oscillatory when regulating a flow in multiple TCP connections. The stability boundary of t...
Xi Chen, Siu Chung Wong, Chi K. Michael Tse, Ljilj...
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 4 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
PKDD
2007
Springer
132views Data Mining» more  PKDD 2007»
15 years 4 months ago
An Algorithm to Find Overlapping Community Structure in Networks
Recent years have seen the development of many graph clustering algorithms, which can identify community structure in networks. The vast majority of these only find disjoint commun...
Steve Gregory
WIA
2007
Springer
15 years 4 months ago
Average Value and Variance of Pattern Statistics in Rational Models
We study the pattern statistics representing the number of occurrences of a given string in a word of length n generated at random by rational stochastic models, defined by means ...
Massimiliano Goldwurm, Roberto Radicioni