Learn More
A novel portable hardware architecture for the Elliptic Curve Method of factoring, designed and optimized for application in the relation collection step of the Number Field Sieve, is described and analyzed. A comparison with an earlier proof-of-concept design by Pelzl, ˇ Simka, et al. has been performed, and a substantial improvement has been demonstrated(More)
—While location-based services are already well established in outdoor scenarios, they are still not available in indoor environments. The reason for this can be found in two open problems: First, there is still no off-the-shelf indoor positioning system for mobile devices and, second, indoor maps are not publicly available for most buildings. While there(More)
Many location-based applications such as geo-social networks rely on location services storing mobile object positions. To update positions on location servers, position update protocols are used. On the one hand, these protocols decide when an update has to be sent to ensure a certain quality of position information. On the other hand, they try to minimize(More)
On-line chain partitioning problem of on-line posets has been open for the past 20 years. The best known on-line algorithm uses 5 w −1 4 chains to cover poset of width w. Felsner [3] introduced a variant of this problem considering only up-growing posets, i.e. on-line posets in which each new point is maximal at the moment of its arrival. He presented an(More)
— A novel portable hardware architecture of the Elliptic Curve Method of factoring, designed and optimized for application in the relation collection step of the Number Field Sieve, is described and analyzed. A comparison with an earlier proof-of-concept design by Pelzl, ˇ Simka, et al. has been performed, and a substantial improvement has been demonstrated(More)
The differential effects of reinforcement contingencies and contextual variables on human performance were investigated in two experiments. In Experiment 1, adult human subjects operated a joystick in a video game in which the destruction of targets was arranged according to a yoked variable-ratio variable-interval schedule of reinforcement. Three variables(More)