Sciweavers

10901 search results - page 2127 / 2181
» Approximations in Distributed Optimization
Sort
View
SBCCI
2005
ACM
114views VLSI» more  SBCCI 2005»
15 years 8 months ago
Traffic generation and performance evaluation for mesh-based NoCs
The designer of a system on a chip (SoC) that connects IP cores through a network on chip (NoC) needs methods to support application performance evaluation. Two key aspects these ...
Leonel Tedesco, Aline Mello, Diego Garibotti, Ney ...
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
15 years 8 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
TLDI
2005
ACM
151views Formal Methods» more  TLDI 2005»
15 years 8 months ago
Strict bidirectional type checking
Completely annotated lambda terms (such as are arrived at via the straightforward encodings of various types from System F) contain much redundant type information. Consequently, ...
Adam J. Chlipala, Leaf Petersen, Robert Harper
ATAL
2005
Springer
15 years 8 months ago
An agent-based approach for managing symbiotic simulation of semiconductor assembly and test operation
The rapid changing business environment of high-tech asset intensive enterprises such as semiconductor manufacturing constantly drives production managers to look for better solut...
Malcolm Yoke-Hean Low, Kong Wei Lye, Peter Lenderm...
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
« Prev « First page 2127 / 2181 Last » Next »