Sciweavers

46 search results - page 5 / 10
» XPath evaluation in linear time with polynomial combined com...
Sort
View
CADE
2006
Springer
15 years 9 months ago
Solving Sparse Linear Constraints
Linear arithmetic decision procedures form an important part of theorem provers for program verification. In most verification benchmarks, the linear arithmetic constraints are dom...
Shuvendu K. Lahiri, Madanlal Musuvathi
99
Voted
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
RTSS
2007
IEEE
15 years 3 months ago
Optimal Discrete Rate Adaptation for Distributed Real-Time Systems
Many distributed real-time systems face the challenge of dynamically maximizing system utility and meeting stringent resource constraints in response to fluctuations in system wo...
Yingming Chen, Chenyang Lu, Xenofon D. Koutsoukos
CVPR
2004
IEEE
15 years 11 months ago
Linear Model Hashing and Batch RANSAC for Rapid and Accurate Object Recognition
This paper proposes a joint feature-based model indexing and geometric constraint based alignment pipeline for efficient and accurate recognition of 3D objects from a large model ...
Ying Shan, Bogdan Matei, Harpreet S. Sawhney, Rake...
ICDCS
2010
IEEE
14 years 9 months ago
Complexity Analysis of Weak Multitolerance
—In this paper, we classify multitolerant systems, i.e., systems that tolerate multiple classes of faults and provide potentially different levels of tolerance to them in terms o...
Jingshu Chen, Sandeep Kulkarni