Sciweavers

30 search results - page 4 / 6
» The workload you have, the workload you would like
Sort
View
EUROCRYPT
1995
Springer
13 years 9 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
ISCA
2010
IEEE
176views Hardware» more  ISCA 2010»
13 years 10 months ago
Forwardflow: a scalable core for power-constrained CMPs
Chip Multiprocessors (CMPs) are now commodity hardware, but commoditization of parallel software remains elusive. In the near term, the current trend of increased coreper-socket c...
Dan Gibson, David A. Wood
ICPR
2006
IEEE
14 years 6 months ago
Does EigenPalm work? A System and Evaluation Perspective
Recently, there are keen interests in EigenPalm, which, collectively, refers to those methods that extract palmprint features directly from the appearance by means of Principle Co...
Adams Wai-Kin Kong, David Zhang, Jane You, King Ho...
GLOBECOM
2006
IEEE
13 years 11 months ago
Blocking Vulnerable Paths of Wireless Sensor Networks
— In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as m...
Shu Zhou, Min-You Wu, Wei Shu
SYNTHESE
2011
85views more  SYNTHESE 2011»
13 years 21 days ago
Modeling reality
: My aim in this paper is to articulate an account of scientific modeling that reconciles pluralism about modeling with a modest form of scientific realism. The central claim of th...
Christopher Pincock