Sciweavers

628 search results - page 120 / 126
» Designing the perfect auction
Sort
View
FSTTCS
2003
Springer
15 years 2 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
VISUALIZATION
1999
IEEE
15 years 1 months ago
Multi-Projector Displays Using Camera-Based Registration
Conventional projector-based display systems are typically designed around precise and regular configurations of projectors and display surfaces. While this results in rendering s...
Ramesh Raskar, Michael S. Brown, Ruigang Yang, Wei...
GECCO
1999
Springer
15 years 1 months ago
Reaction Temperature Constraints in DNA Computing
Using the thermodynamics of DNA melting, a technique is proposed to choose a reaction temperature for the DNA computation that minimizes the potential for mishybridizations. Adlem...
Russell J. Deaton
ISCA
1994
IEEE
117views Hardware» more  ISCA 1994»
15 years 1 months ago
Evaluating Stream Buffers as a Secondary Cache Replacement
Today's commodity microprocessors require a low latency memory system to achieve high sustained performance. The conventional high-performance memory system provides fast dat...
Subbarao Palacharla, Richard E. Kessler
ASAP
1997
IEEE
107views Hardware» more  ASAP 1997»
15 years 1 months ago
Tiling with limited resources
In the framework of perfect loop nests with uniform dependences, tiling has been extensively studied as a source-to-source program transformation. Little work has been devoted to ...
Pierre-Yves Calland, Jack Dongarra, Yves Robert