Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | J. Smit |
A cancellation free algorithm, with factoring capabilities, for the efficient solution of large sparse sets of equations. |
SYMSACC |
1981 |
DBLP DOI BibTeX RDF |
|
15 | Adi Shamir |
Factoring Numbers in O(log n) Arithmetic Steps. |
Inf. Process. Lett. |
1979 |
DBLP DOI BibTeX RDF |
|
15 | George E. Collins |
Factoring univariate integral polynomial in polynomial average time. |
EUROSAM |
1979 |
DBLP DOI BibTeX RDF |
|
15 | Stephen McAdams, Albert S. Bregman |
The Perceptual Factoring of Acoustic Sequences into Musical Streams. |
ICMC |
1978 |
DBLP BibTeX RDF |
|
15 | Peter J. Weinberger, Linda Preiss Rothschild |
Factoring Polynomials Over Algebraic Number Fields. |
ACM Trans. Math. Softw. |
1976 |
DBLP DOI BibTeX RDF |
|
15 | Paul S. Wang |
Factoring larger multivariate polynomials. |
SIGSAM Bull. |
1976 |
DBLP DOI BibTeX RDF |
|
15 | Barry M. Trager |
Algebraic factoring and rational function integration. |
SYMSACC |
1976 |
DBLP DOI BibTeX RDF |
|
15 | Paul S. Wang |
Factoring multivariate polynomials over algebraic number fields in MACSYMA. |
SIGSAM Bull. |
1975 |
DBLP DOI BibTeX RDF |
|
15 | Elwyn R. Berlekamp |
Factoring polynomials over large finite fields. |
SYMSAC |
1971 |
DBLP DOI BibTeX RDF |
|
15 | Saligram G. S. Shiva, Paul E. Allard |
A few useful details about a known technique for factoring 1+X2q-1 (Corresp.). |
IEEE Trans. Inf. Theory |
1970 |
DBLP DOI BibTeX RDF |
|
15 | Donald L. Dietmeyer, Peter R. Schneider |
A Computer-Oriented Factoring Algorithm for NOR Logic Design. |
IEEE Trans. Electron. Comput. |
1965 |
DBLP DOI BibTeX RDF |
|
15 | W. D. Frazer, David E. Muller |
A Method for Factoring the Action of Asynchronous Circuits |
SWCT |
1960 |
DBLP DOI BibTeX RDF |
|
9 | Yasuhiro Takahashi, Seiichiro Tani, Noboru Kunihiro |
Quantum addition circuits and unbounded fan-out. |
Quantum Inf. Comput. |
2010 |
DBLP DOI BibTeX RDF |
|
9 | Mingjie Lin, Yaling Ma |
Scalable architecture for programmable quantum gate array (abstract only). |
FPGA |
2010 |
DBLP DOI BibTeX RDF |
reconfigurable, computing, quantum |
9 | Corné Hoogendoorn, Federico Sukno, Sebastián Ordas, Alejandro F. Frangi |
Bilinear Models for Spatio-Temporal Point Distribution Analysis. |
Int. J. Comput. Vis. |
2009 |
DBLP DOI BibTeX RDF |
Cardiac modeling, Cardiac dynamics, Spatiotemporal decomposition, Statistical shape modeling, Bilinear models |
9 | Shilpa Gulati, Chetan Jhurani, Benjamin Kuipers, Raul G. Longoria |
A framework for planning comfortable and customizable motion of an assistive mobile robot. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
9 | S. Farhat, Greg Simco, Frank J. Mitropoulos |
Refining and reasoning about nonfunctional requirements. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
software engineering, aspect-oriented programming, nonfunctional requirements |
9 | Bernd Borchert, Pierre McKenzie, Klaus Reinhardt |
Few Product Gates But Many Zeros. |
MFCS |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Ryan Newton, Teresa Ko |
Experience report: embedded, parallel computer-vision with a functional DSL. |
ICFP |
2009 |
DBLP DOI BibTeX RDF |
stream processing languages, computer vision |
9 | Giuseppe Ateniese, Seny Kamara, Jonathan Katz |
Proofs of Storage from Homomorphic Identification Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Steffen Unkel, Nickolay T. Trendafilov |
Factor Analysis as Data Matrix Decomposition: A New Approach for Quasi-Sphering in Noisy ICA. |
ICA |
2009 |
DBLP DOI BibTeX RDF |
Noisy ICA, Less observations than variables, Factor rotation, Procrustes problems, Climate anomalies, Exploratory factor analysis |
9 | Guilhem Castagnos, Fabien Laguillaumie |
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography |
9 | Srivatsan Narayanan, Ananth Raghunathan, Ramarathnam Venkatesan |
Obfuscating straight line arithmetic programs. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
hard-to-factor polynomials, straight line arithmetic programs, drm, obfuscation, software protection, secure hardware |
9 | Betty H. C. Cheng, Peter Sawyer, Nelly Bencomo, Jon Whittle 0001 |
A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty. |
MoDELS |
2009 |
DBLP DOI BibTeX RDF |
Requirements engineering, uncertainty, goal models, dynamically adaptive systems |
9 | Eyal Kushilevitz, Enav Weinreb |
On the complexity of communication complexity. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
protocol tree, lower bounds, communication complexity, hardness of approximation, pseudo random functions |
9 | Markus Rosenkranz, Georg Regensburger, Loredana Tec, Bruno Buchberger |
A Symbolic Framework for Operations on Linear Boundary Problems. |
CASC |
2009 |
DBLP DOI BibTeX RDF |
Linear boundary problem, Green’s operator, Integro-Differential Operator, Ordinary Differential Equation, Wave Equation |
9 | Seyed Mohammad Mahdi Javadi, Michael B. Monagan |
On factorization of multivariate polynomials over algebraic number and function fields. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
hensel lifting, sparse interpolation, factorization algorithms, algebraic function fields |
9 | Felix Brandt 0001, Tuomas Sandholm |
On the Existence of Unconditionally Privacy-Preserving Auction Protocols. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
auctions, multiparty computation |
9 | Rodney Van Meter, W. J. Munro, Kae Nemoto, Kohei M. Itoh |
Arithmetic on a distributed-memory quantum multicomputer. |
ACM J. Emerg. Technol. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
quantum computer architecture, Quantum computing |
9 | Gerasimos C. Meletiou, Arne Winterhof |
Interpolation of the Double Discrete Logarithm. |
WAIFI |
2008 |
DBLP DOI BibTeX RDF |
double discrete logarithm, interpolation polynomials, finite fields, elliptic curves |
9 | Kiran S. Kedlaya, Christopher Umans |
Fast Modular Composition in any Characteristic. |
FOCS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Kimmo Halunen, Pauli Rikula, Juha Röning |
On the Security of VSH in Password Schemes. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
VSH, hash function, preimage attack, password security |
9 | Sander Vermolen |
Software Language Evolution. |
WCRE |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen |
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hashem Hashemi Najaf-abadi, Eric Rotenberg |
Configurational Workload Characterization. |
ISPASS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hoi-Ching Lam, Ming Lu |
Simulation-based, optimized scheduling of limited bar-benders over multiple building sites. |
WSC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Aleksey Koval, Boris S. Verkhovsky |
Analysis of RSA over Gaussian Integers Algorithm. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Gaussian Integers, Gaussian primes, Cryptography, RSA |
9 | Mihir Bellare, Todor Ristov |
Hash Functions from Sigma Protocols and Improvements to VSH. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Ravi Chugh, Jan Wen Voung, Ranjit Jhala, Sorin Lerner |
Dataflow analysis for concurrent programs using datarace detection. |
PLDI |
2008 |
DBLP DOI BibTeX RDF |
locksets, interprocedural analysis, multithreaded programs, summaries |
9 | Gregory Neven |
Efficient Sequential Aggregate Signed Data. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sachin Shrivastava, Harindranath Parameswaran |
Statistical Crosstalk Noise Analysis Using First Order Parameterized Approach for Aggressor Grouping. |
ISQED |
2008 |
DBLP DOI BibTeX RDF |
statistical crosstalk, aggressor grouping |
9 | Benoît Chevallier-Mames, David Naccache, Jacques Stern |
Linear Bandwidth Naccache-Stern Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography |
9 | Tibor Jager, Jörg Schwenk |
On the Equivalence of Generic Group Models. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs) |
9 | Xiangfu Meng, Zong Min Ma 0001, Ranran Cheng, Xing Wang 0002 |
A Context-Sensitive Approach for Web Database Query Results Ranking. |
Web Intelligence |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Dimitrios Sklavakis, Ioannis Refanidis |
An Individualized Web-Based Algebra Tutor Based on Dynamic Deep Model Tracing. |
SETN |
2008 |
DBLP DOI BibTeX RDF |
model tracing, ontologies, intelligent tutoring systems, web based, authoring systems, cognitive tutors |
9 | Sean Hallgren |
Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem. |
J. ACM |
2007 |
DBLP DOI BibTeX RDF |
quantum computation, Quantum algorithms |
9 | Keye Martin |
Secure Communication without Encryption? |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Willi Geiselmann, Rainer Steinwandt |
Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Catriona M. Lucey, Colin C. Murphy |
Constraint Based Design of Two-Channel Paraunitary Filter Banks of a Given Length Over GF(2r). |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Forward-secure signatures in untrusted update environments: efficient and generic constructions. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Rupert J. Hartung |
Cryptography Based on Quadratic Forms: Complexity Considerations. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Katharina Reinecke |
Cultural Adaptivity for the Semantic Web. |
ISWC/ASWC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Abdelkader Heni, Adel M. Alimi |
Approximate inference in dynamic possibilistic networks. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Andrew M. Childs, Leonard J. Schulman, Umesh V. Vazirani |
Quantum Algorithms for Hidden Nonlinear Structures. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Bogdan Groza |
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Philippe Jorrand |
Quantum information processing and communication: the computer science perspective. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Abdullah Konak |
Combining network reductions and simulation to estimate network reliability. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik |
A Kilobit Special Number Field Sieve Factorization. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Ristenpart, Thomas Shrimpton |
How to Build a Hash Function from Any Collision-Resistant Function. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | David E. Millard, Hugh C. Davis, Yvonne Margaret Howard, Lester Gilbert, Robert John Walters, Noura Abbas, Gary B. Wills |
The Service Responsibility and Interaction Design Method: Using an Agile Approach for Web Service Design. |
ECOWS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Mark Kent O'Keeffe, Mel Ó Cinnéide |
Getting the most from search-based refactoring. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
automated design improvement, object-oriented product metrics, refactoring, search-based software engineering |
9 | Kouji Harada, Yoshiteru Ishida |
Mutation Probability Threshold of HIV for AIDS. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
Antigenic Diversity Threshold, Mutation Probability Threshold, HIV, Immune System, AIDS |
9 | Katherine Forbes-Riley, Diane J. Litman |
Investigating Human Tutor Responses to Student Uncertainty for Adaptive System Development. |
ACII |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Muxiang Zhang |
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Alexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo |
On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, Network security, Key-agreement, Diffie-Hellman |
9 | Marc de Kamps, Volker Baier |
Multiple Interacting Instantiations of Neuronal Dynamics (MIIND): a Library for Rapid Prototyping of Models in Cognitive Neuroscience. |
IJCNN |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Deepak Verma, Rajesh P. N. Rao |
Imitation Learning Using Graphical Models. |
ECML |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Md. Mafijul Islam, Alexander Busck, Mikael Engbom, Simji Lee, Michel Dubois 0001, Per Stenström |
Loop-level Speculative Parallelism in Embedded Applications. |
ICPP |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jean-Sébastien Coron |
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Coppersmith’s theorem, cryptanalysis, lattice reduction |
9 | Michel Hirschowitz, André Hirschowitz, Tom Hirschowitz |
A Theory for Game Theories. |
FSTTCS |
2007 |
DBLP DOI BibTeX RDF |
categories, Game semantics |
9 | Peter F. Linington, Pulitha Lakmith Liyanagama |
Incorporating Security Behaviour into Business Models Using a Model Driven Approach. |
EDOC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Mithun Das Gupta, Prateek Sarkar |
A Shared Parts Model for Document Image Recognition. |
ICDAR |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Erich L. Kaltofen, Bin Li, Kartik Sivaramakrishnan, Zhengfeng Yang, Lihong Zhi |
Lower bounds for approximate factorizations via semidefinite programming: (extended abstract). |
SNC |
2007 |
DBLP DOI BibTeX RDF |
hybrid method, SDP, approximate factorization |
9 | Amparo Gil, Javier Segura 0001, Nico M. Temme |
Computing the real parabolic cylinder functions U(a, x), V(a, x). |
ACM Trans. Math. Softw. |
2006 |
DBLP DOI BibTeX RDF |
Parabolic cylinder functions, nonoscillating integral representations, asymptotic expansions, numerical quadrature |
9 | Stephen A. Cook, Neil Thapen |
The strength of replacement in weak arithmetic. |
ACM Trans. Comput. Log. |
2006 |
DBLP DOI BibTeX RDF |
cryptography, PV, Bounded arithmetic |
9 | Christopher D. Rickett, Sung-Eun Choi, Craig Edward Rasmussen, Matthew J. Sottile |
Rapid prototyping frameworks for developing scientific applications: A case study. |
J. Supercomput. |
2006 |
DBLP DOI BibTeX RDF |
Components, Python, CCA |
9 | Dima Grigoriev, Ilia N. Ponomarenko |
Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Homomorphic cryptosystem, Free product of groups, Encrypting boolean circuits |
9 | Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy |
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design |
9 | Anup Hosangadi, Farzan Fallah, Ryan Kastner |
Optimizing Polynomial Expressions by Algebraic Factorization and Common Subexpression Elimination. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Richard A. Waltz, José Luis Morales, Jorge Nocedal, Dominique Orban |
An interior algorithm for nonlinear optimization that combines line search and trust region steps. |
Math. Program. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Miguel P. Monteiro 0001, João M. Fernandes |
Towards a Catalogue of Refactorings and Code Smells for AspectJ. |
T. Aspect-Oriented Software Development |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Fatima Abu Salem |
A New Sparse Gaussian Elimination Algorithm and the Niederreiter Linear System for Trinomials over F2. |
Computing |
2006 |
DBLP DOI BibTeX RDF |
Niederreiter algorithm, Finite fields, polynomial factorization, sparse Gaussian elimination |
9 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
RSA, smartcard, Montgomery multiplication, crypto-coprocessor |
9 | Scott T. Parsell, Jonathan Sorenson |
Fast Bounds on the Distribution of Smooth Numbers. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Alexander W. Dent, Steven D. Galbraith |
Hidden Pairings and Trapdoor DDH Groups. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Björn Axenath, Holger Giese, Florian Klein 0001, Ursula Frank |
Systematic Requirements-Driven Evaluation and Synthesis of Alternative Principle Solutions for Advanced Mechatronic Systems. |
RE |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Alexey S. Rodionov, Olga K. Rodionova |
Network Probabilistic Connectivity: Expectation of a Number of Disconnected Pairs of Nodes. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Yang Cui 0001, Kazukuni Kobara, Hideki Imai |
On Achieving Chosen Ciphertext Security with Decryption Errors. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Arthur Schmidt |
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Greg Butler, Guang Wang, Yue Wang, Liqian Zou |
Query Optimization for a Graph Database with Visual Queries. |
DASFAA |
2006 |
DBLP DOI BibTeX RDF |
|
9 | An Commeine, Igor A. Semaev |
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Discrete Logarithms, Number Field Sieve |
9 | Antonio Bucchiarone, Andrea Polini, Patrizio Pelliccione, Massimo Tivoli |
Towards an architectural approach for the dynamic and automatic composition of software components. |
ROSATEA |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Phil McMinn, Mark Harman, David W. Binkley, Paolo Tonella |
The species per path approach to SearchBased test data generation. |
ISSTA |
2006 |
DBLP DOI BibTeX RDF |
testability transformation, evolutionary testing, search-based software engineering, automated test data generation |
9 | Alejandro J. Troccoli, Peter K. Allen |
Recovering Illumination and Texture Using Ratio Images. |
3DPVT |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Vladimir Aleksic, Anatoli Degtyarev |
On Arbitrary Selection Strategies for Basic Superposition. |
JELIA |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Talal Bonny, Jörg Henkel |
Using Lin-Kernighan algorithm for look-up table compression to improve code density. |
ACM Great Lakes Symposium on VLSI |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, code compression, huffman coding |
9 | Jia Liu, Don S. Batory, Christian Lengauer |
Feature oriented refactoring of legacy applications. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
program algebra, refactoring, features, product lines, program synthesis, feature interactions |
9 | Louis Granboulan, Antoine Joux, Jacques Stern |
Inverting HFE Is Quasipolynomial. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|