Sciweavers

1411 search results - page 208 / 283
» A Value Analysis for C Programs
Sort
View
160
Voted
VEE
2005
ACM
143views Virtualization» more  VEE 2005»
15 years 10 months ago
Virtual machine showdown: stack versus registers
Virtual machines (VMs) are commonly used to distribute programs in an architecture-neutral format, which can easily be interpreted or compiled. A long-running question in the desi...
Yunhe Shi, David Gregg, Andrew Beatty, M. Anton Er...
156
Voted
ICALP
2010
Springer
15 years 9 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
APPROX
2010
Springer
207views Algorithms» more  APPROX 2010»
15 years 6 months ago
Exploiting Concavity in Bimatrix Games: New Polynomially Tractable Subclasses
Abstract. We study the fundamental problem of computing an arbitrary Nash equilibrium in bimatrix games. We start by proposing a novel characterization of the set of Nash equilibri...
Spyros C. Kontogiannis, Paul G. Spirakis
GLOBECOM
2010
IEEE
15 years 3 months ago
Passively Controllable Smart Antennas
Abstract-- This work deals with devising a secure, powerefficient, beam-steerable and on-chip transmission system for wireless sensor networks. A passively controllable smart (PCS)...
Javad Lavaei, Aydin Babakhani, Ali Hajimiri, John ...
WWW
2001
ACM
16 years 5 months ago
Personalizing E-commerce applications with on-line heuristic decision making
This paper describes new technology based on on-line decision support for providing personalized customer treatments in web-based storefronts and information sites. The central im...
Vinod Anupam, Richard Hull, Bharat Kumar