Sciweavers

1403 search results - page 101 / 281
» About Approximations of Exponentials
Sort
View
FOCS
2008
IEEE
15 years 7 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
ADAPTIVE
2007
Springer
15 years 7 months ago
User Profiles for Personalized Information Access
Abstract. The amount of information available online is increasing exponentially. While this information is a valuable resource, its sheer volume limits its value. Many research pr...
Susan Gauch, Mirco Speretta, Aravind Chandramouli,...
ICCD
2005
IEEE
131views Hardware» more  ICCD 2005»
15 years 6 months ago
Efficient Thermal Simulation for Run-Time Temperature Tracking and Management
As power density increases exponentially, run-time regulation of operating temperature by dynamic thermal management becomes imperative. This paper proposes a novel approach to re...
Hang Li, Pu Liu, Zhenyu Qi, Lingling Jin, Wei Wu, ...
ICDT
2003
ACM
106views Database» more  ICDT 2003»
15 years 6 months ago
Processing XML Streams with Deterministic Automata
We consider the problem of evaluating a large number of XPath expressions on an XML stream. Our main contribution consists in showing that Deterministic Finite Automata (DFA) can b...
Todd J. Green, Gerome Miklau, Makoto Onizuka, Dan ...
ISCAPDCS
2001
15 years 2 months ago
Bandwidth Learning in Distributed Networking Environments for Global Information Dissemination
- This work investigates bandwidth learning algorithms in a version of a distributed heterogeneous data dissemination system called the Agile Information Control Environment (AICE)...
Craig Sullivan, Michael Jurczyk