Open AccessJournal Article
The art of computer programming. Vol.2: Seminumerical algorithms
Reads0
Chats0
About:
This article is published in Literacy.The article was published on 1981-01-01 and is currently open access. It has received 2636 citations till now. The article focuses on the topics: Computer programming.read more
Citations
More filters
Book ChapterDOI
Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick
Katsuyuki Okeya,Kouichi Sakurai +1 more
TL;DR: The Montgomery trick is applied to reduce the number of inversions required with a width window w from O(22w) to O(w), which enables the removal of points that will not be used later from the process of precomputation.
Journal ArticleDOI
Statistical Debugging for Simulations
TL;DR: This work presents two research contributions, elastic predicates and many-valued labeling functions, that enable debuggers designed for general-purpose software to become more effective for simulations employing random variates and continuous numbers.
Proceedings Article
Generating CP-Nets uniformly at random
TL;DR: A novel algorithm for provably generating acyclic CP-nets uniformly at random is provided, which is computationally efficient and allows for multi-valued domains and arbitrary bounds on the indegree in the dependency graph.
Journal ArticleDOI
Blocking Self-Avoiding Walks Stops Cyber-Epidemics: A Scalable GPU-Based Approach
TL;DR: This work investigates the Spread Interdiction problems that seek the most effective links (or nodes) for removal under the well-known Linear Threshold model and proposes novel CPU-GPU methods that scale to networks with billions of edges yet possess arigorous theoretical guarantee on the solution quality.
Dissertation
On the security of Java Card platforms against hardware attacks
TL;DR: This thesis proves that the type-safety property, the control-flow integrity and the application isolation can be tampered with by the combination of adequate fault injections and malicious applications and presents different approaches allowing to improve the resistance of Java Cards and Java Card applications against combined attacks.