Algorithms

Results: 10964



#Item
551

Proof, beliefs, and algorithms through the lens of sum-of-squares 1 Tensor decomposition via sum of squares One of the most basic tools in data analysis is least squares regression.

Add to Reading List

Source URL: sumofsquares.org

- Date: 2016-11-17 19:44:26
    552

    On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2006-02-15 04:14:19
      553

      Analyzing Memory Accesses in x86 Executables ? Gogul Balakrishnan and Thomas Reps Comp. Sci. Dept., University of Wisconsin; {bgogul,reps}@cs.wisc.edu Abstract. This paper concerns static-analysis algorithms for analyzin

      Add to Reading List

      Source URL: research.cs.wisc.edu

      - Date: 2004-01-07 11:19:28
        554

        Subexponential Parameterized Algorithms for Bounded-Degree Connected Subgraph Problems on Planar Graphs

        Add to Reading List

        Source URL: users.uoa.gr

        - Date: 2014-06-11 17:30:32
          555

          JMLR: Workshop and Conference Proceedings vol 40:1–24, 2015 On-Line Learning Algorithms for Path Experts with Non-Additive Losses Corinna Cortes

          Add to Reading List

          Source URL: www.cs.nyu.edu

          - Date: 2016-11-07 10:26:01
            556

            Theory Comput Syst DOIs00224A Note on Exact Algorithms for Vertex Ordering Problems on Graphs Hans L. Bodlaender · Fedor V. Fomin ·

            Add to Reading List

            Source URL: users.uoa.gr

            - Date: 2014-06-11 17:30:32
              557

              Deterministic Sampling Algorithms for Network Design Anke van Zuylen? School of Operations Research and Information Engineering, Cornell University, Ithaca, NYFax: (.

              Add to Reading List

              Source URL: arvanzuijlen.people.wm.edu

              - Date: 2010-09-17 07:13:54
                558

                CoreScope: Graph Mining Using k-Core Analysis Patterns, Anomalies and Algorithms Kijung Shin Tina Eliassi-Rad Christos Faloutsos

                Add to Reading List

                Source URL: www.cs.cmu.edu

                - Date: 2016-10-15 20:41:23
                  559

                  College of Computer & Information Science Northeastern University CS 7880: Network Algorithms and Analysis SpringApril 2012

                  Add to Reading List

                  Source URL: www.ccs.neu.edu

                  - Date: 2012-04-03 12:25:37
                    560

                    Conditionally Optimal Algorithms for Generalized Büchi Games Krishnendu Chatterjee1 , Wolfgang Dvořák2 , Monika Henzinger2 , and Veronika Loitzenbauer2 1 2

                    Add to Reading List

                    Source URL: eprints.cs.univie.ac.at

                    - Date: 2016-06-15 09:15:28
                      UPDATE