Sciweavers

3357 search results - page 132 / 672
» Controlling Complexity
Sort
View
MTV
2007
IEEE
121views Hardware» more  MTV 2007»
15 years 8 months ago
Chico: An On-chip Hardware Checker for Pipeline Control Logic
The widening gap between CPU complexity and verification capability is becoming increasingly more salient. It is impossible to completely verify the functionality of a modern mic...
Andrew DeOrio, Adam Bauserman, Valeria Bertacco
BMCBI
2005
134views more  BMCBI 2005»
15 years 1 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
132
Voted
ASIACRYPT
2010
Springer
14 years 12 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
MICRO
2010
IEEE
202views Hardware» more  MICRO 2010»
14 years 8 months ago
Hardware Support for Relaxed Concurrency Control in Transactional Memory
Today's transactional memory systems implement the two-phase-locking (2PL) algorithm which aborts transactions every time a conflict happens. 2PL is a simple algorithm that pr...
Utku Aydonat, Tarek S. Abdelrahman
ICRA
2003
IEEE
90views Robotics» more  ICRA 2003»
15 years 7 months ago
Exploiting redundancy to implement multi-objective behavior
Teams of robots can be redundant with respect to a given task. This redundancy can be exploited to pursue additional objectives during the execution of the task. In this paper, we...
Yuandong Yang, Oliver Brock, Roderic A. Grupen