Sciweavers

1127 search results - page 88 / 226
» Value Compression for Efficient Computation
Sort
View
AI
2008
Springer
14 years 10 months ago
Semiring induced valuation algebras: Exact and approximate local computation algorithms
Local computation in join trees or acyclic hypertrees has been shown to be linked to a particular algebraic structure, called valuation algebra. There are many models of this alge...
Jürg Kohlas, Nic Wilson
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 10 months ago
Locating phase transitions in computationally hard problems
We discuss how phase-transitions may be detected in computationally hard problems in the context of anytime algorithms. Treating the computational time, value and utility functions...
B. Ashok, T. K. Patra
ICISC
2009
146views Cryptology» more  ICISC 2009»
14 years 7 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
GRID
2007
Springer
15 years 4 months ago
Load prediction using hybrid model for computational grid
—Due to the dynamic nature of grid environments, schedule algorithms always need assistance of a long-time-ahead load prediction to make decisions on how to use grid resources ef...
Yongwei Wu, Yulai Yuan, Guangwen Yang, Weimin Zhen...
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 4 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi