Search
Now showing items 111-120 of 377
On The Complexity Of Grobner Basis And Border Basis Detection
(2013-06-14)
The theory of Grobner bases has garnered the interests of a large number of researchers in computational algebra due to its applications not only in mathematics but also in areas like control systems, robotics, cryptography ...
On A Cubic Sieve Congruence Related To The Discrete Logarithm Problem
(2013-05-21)
There has been a rapid increase interest in computational number theory ever since the invention of public-key cryptography. Various attempts to solve the underlying hard problems behind public-key cryptosystems has led ...
Compiler-Assisted Energy Optimization For Clustered VLIW Processors
(2010-04-13)
Clustered architecture processors are preferred for embedded systems because centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption. Although clustering helps by ...
An Improved Lower Bound for Depth four Arithmetic Circuits
(2018-05-29)
We study the problem of proving lower bounds for depth four arithmetic circuits. Depth four circuits have been receiving much attraction when it comes to recent circuit lower bound results, as a result of the series of ...
Optimization Algorithms for Deterministic, Stochastic and Reinforcement Learning Settings
(2018-05-30)
Optimization is a very important field with diverse applications in physical, social and biological sciences and in various areas of engineering. It appears widely in ma-chine learning, information retrieval, regression, ...
Incentive Design for Crowdfunding and Crowdsourcing Markets
(2018-05-23)
With the ever-increasing trend in the number of social interactions getting intermediated by technology (the world wide web) as the backdrop, this thesis focuses on the design of mechanisms for online communities (crowds) ...
Fast Actively Secure OT Extension for Short Secrets
(2018-05-25)
Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread application in general secure multi-party computation (MPC) as well as in a number of tailored and special-purpose problems ...