Sciweavers

3731 search results - page 655 / 747
» cases 2006
Sort
View
JACM
2000
86views more  JACM 2000»
15 years 12 days ago
Periodification scheme: constructing sorting networks with constant period
We consider comparator networks M that are used repeatedly: while the output produced by M is not sorted, it is fed again into M. Sorting algorithms working in this way are called ...
Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oes...
JAR
2000
145views more  JAR 2000»
15 years 12 days ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
JASIS
2000
68views more  JASIS 2000»
15 years 12 days ago
Tropes, history, and ethics in professional discourse and information science
: This paper argues that professional discourses tend to align themselves with dominant ideological and social forces by means of language. In twentieth century modernity, the use ...
Ronald Day
JC
2000
138views more  JC 2000»
15 years 12 days ago
Multivariate Polynomials, Duality, and Structured Matrices
We rst review thebasic properties of the well knownclasses of Toeplitz, Hankel, Vandermonde, and other related structured matrices and reexamine their correlation to operations wi...
Bernard Mourrain, Victor Y. Pan
JDM
2000
82views more  JDM 2000»
15 years 12 days ago
Binary Equivalents of Ternary Relationships in Entity-Relationship Modeling: A Logical Decomposition Approach
Little work has been completed which addresses the logical composition and use of ternary relationships in entity-relationship modeling. Many modeling notations and most CASE tool...
Trevor H. Jones, Il-Yeol Song