Sciweavers

14704 search results - page 163 / 2941
» computing 2007
Sort
View
CCCG
2009
15 years 4 months ago
New Algorithms for Computing Maximum Perimeter and Maximum Area of the Convex Hull of Imprecise Inputs Based On the Parallel Lin
In this paper, we present new algorithms for computing maximum perimeter and maximum area of the convex hull of imprecise inputs based on the parallel line segment model. The runn...
Wenqi Ju, Jun Luo
AMC
2007
124views more  AMC 2007»
15 years 3 months ago
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
In this contribution instances of a problem introduced by the differential cryptanalysis of Feistel cryptosystems are formulated as optimization tasks. The performance of Evoluti...
E. C. Laskari, Gerasimos C. Meletiou, Yannis C. St...
AMC
2007
86views more  AMC 2007»
15 years 3 months ago
Further refinement of pairing computation based on Miller's algorithm
In 2006, Blake, Murty and Xu proposed three refinements to Miller’s algorithm for computing Weil/Tate Pairings. In this paper we extend their work and propose a generalized algo...
Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
114
Voted
AMC
2006
119views more  AMC 2006»
15 years 3 months ago
Interval iterative methods for computing Moore-Penrose inverse
In this paper, we import interval method to the iteration for computing Moore-Penrose inverse of the full row (or column) rank matrix. Through modifying the classical Newton itera...
Xian Zhang, Jianfeng Cai, Yimin Wei
FTHCI
2007
66views more  FTHCI 2007»
15 years 3 months ago
End-User Privacy in Human-Computer Interaction
The purpose of this article is twofold. First, we summarize research on the topic of privacy in Human–Computer Interaction (HCI), outlining current approaches, results, and tren...
Giovanni Iachello, Jason I. Hong