Sciweavers

1136 search results - page 123 / 228
» A case for the accountable cloud
Sort
View
ICS
2010
Tsinghua U.
15 years 8 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
57
Voted
WISE
2009
Springer
15 years 8 months ago
Facing Tagging Data Scattering
Web2.0 has brought tagging at the forefront of user practises for organizing and locating resources. Unfortunately, these tagging efforts suffer from a main drawback: lack of inter...
Oscar Díaz, Jon Iturrioz, Cristóbal ...
ICCAD
2006
IEEE
108views Hardware» more  ICCAD 2006»
15 years 8 months ago
Formal model of data reuse analysis for hierarchical memory organizations
– In real-time data-dominated communication and multimedia processing applications, due to the manipulation of large sets of data, a multi-layer memory hierarchy is used to enhan...
Ilie I. Luican, Hongwei Zhu, Florin Balasa
ICCAD
2004
IEEE
125views Hardware» more  ICCAD 2004»
15 years 8 months ago
Simultaneous communication and processor voltage scaling for dynamic and leakage energy reduction in time-constrained systems
In this paper, we propose a new technique for the combined voltage scaling of processors and communication links, taking into account dynamic as well as leakage power consumption....
Alexandru Andrei, Marcus T. Schmitz, Petru Eles, Z...
ICCAD
2004
IEEE
80views Hardware» more  ICCAD 2004»
15 years 8 months ago
Techniques for improving the accuracy of geometric-programming based analog circuit design optimization
We present techniques for improving the accuracy of geometric-programming (GP) based analog circuit design optimization. We describe major sources of discrepancies between the res...
Jintae Kim, Jaeseo Lee, Lieven Vandenberghe