Sciweavers

384 search results - page 26 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ENTCS
2008
90views more  ENTCS 2008»
15 years 2 months ago
A Database Approach to Distributed State Space Generation
We study distributed state space generation on a cluster of workstations. It is explained why state space partitioning by a global hash function is problematic when states contain...
Stefan Blom, Bert Lisser, Jaco van de Pol, Michael...
ICPP
1999
IEEE
15 years 6 months ago
A Bandwidth-Efficient Implementation of Mesh with Multiple Broadcasting
This paper presents a mesh with virtual buses as the bandwidth-efficient implementation of the mesh with multiple broadcasting on which many computational problems can be solved w...
Jong Hyuk Choi, Bong Wan Kim, Kyu Ho Park, Kwang-I...
AAAI
2006
15 years 3 months ago
A Simple and Effective Method for Incorporating Advice into Kernel Methods
We propose a simple mechanism for incorporating advice (prior knowledge), in the form of simple rules, into support-vector methods for both classification and regression. Our appr...
Richard Maclin, Jude W. Shavlik, Trevor Walker, Li...
FPL
2000
Springer
116views Hardware» more  FPL 2000»
15 years 5 months ago
High-Level Area and Performance Estimation of Hardware Building Blocks on FPGAs
Abstract. Field-programmable gate arrays (FPGAs) have become increasingly interesting in system design and due to the rapid technological progress ever larger devices are commercia...
Rolf Enzler, Tobias Jeger, Didier Cottet, Gerhard ...
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 2 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi