Sciweavers

4463 search results - page 782 / 893
» computing 2000
Sort
View
91
Voted
NAA
2000
Springer
97views Mathematics» more  NAA 2000»
15 years 4 months ago
Nested-Dissection Orderings for Sparse LU with Partial Pivoting
We describe the implementation and performance of a novel fill-minimization ordering technique for sparse LU factorization with partial pivoting. The technique was proposed by Gilb...
Igor Brainman, Sivan Toledo
NGC
2000
Springer
115views Communications» more  NGC 2000»
15 years 4 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi
104
Voted
PACS
2000
Springer
83views Hardware» more  PACS 2000»
15 years 4 months ago
A Comparison of Two Architectural Power Models
Reducing power, on both a per cycle basis and as the total energy used over the lifetime of an application, has become more important as small and embedded devices become increasi...
Soraya Ghiasi, Dirk Grunwald
129
Voted
PAKDD
2000
ACM
161views Data Mining» more  PAKDD 2000»
15 years 4 months ago
Adaptive Boosting for Spatial Functions with Unstable Driving Attributes
Combining multiple global models (e.g. back-propagation based neural networks) is an effective technique for improving classification accuracy by reducing a variance through manipu...
Aleksandar Lazarevic, Tim Fiez, Zoran Obradovic
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 4 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval