Sciweavers

2107 search results - page 189 / 422
» Computing Small Search Numbers in Linear Time
Sort
View
FC
2009
Springer
118views Cryptology» more  FC 2009»
15 years 10 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
INFOCOM
2002
IEEE
15 years 8 months ago
Clock Synchronization Algorithms for Network Measurements
Abstract—Packet delay traces are important measurements for analyzing end-to-end performance and for designing traffic control algorithms in computer networks. Due to the fact t...
Li Zhang, Zhen Liu, Cathy H. Xia
IPPS
1999
IEEE
15 years 8 months ago
Regularity Considerations in Instance-Based Locality Optimization
Instance based locality optimization 6 is a semi automatic program restructuring method that reduces the number of cache misses. The method imitates the human approach of consideri...
Claudia Leopold
ASPDAC
2008
ACM
108views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Synthesis and design of parameter extractors for low-power pre-computation-based content-addressable memory using gate-block sel
Content addressable memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing, and networking, that require high-speed searches due t...
Jui-Yuan Hsieh, Shanq-Jang Ruan
ICDE
2007
IEEE
112views Database» more  ICDE 2007»
16 years 5 months ago
Indexing Point Triples Via Triangle Geometry
Database search for images containing icons with specific mutual spatial relationships can be facilitated by an appropriately structured index. For the case of images containing s...
Charles Ben Cranston, Hanan Samet