Sciweavers

628 search results - page 89 / 126
» Designing the perfect auction
Sort
View
ASIACRYPT
2009
Springer
15 years 4 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
COCOON
2006
Springer
15 years 1 months ago
Reconstructing Evolution of Natural Languages: Complexity and Parameterized Algorithms
In a recent article, Nakhleh, Ringe and Warnow introduced perfect phylogenetic networks--a model of language evolution where languages do not evolve via clean speciation--and form...
Iyad A. Kanj, Luay Nakhleh, Ge Xia
79
Voted
HPCA
2008
IEEE
15 years 4 months ago
Speculative instruction validation for performance-reliability trade-off
With reducing feature size, increasing chip capacity, and increasing clock speed, microprocessors are becoming increasingly susceptible to transient (soft) errors. Redundant multi...
Sumeet Kumar, Aneesh Aggarwal
ISCA
2008
IEEE
92views Hardware» more  ISCA 2008»
15 years 3 months ago
Counting Dependence Predictors
Modern processors rely on memory dependence prediction to execute load instructions as early as possible, speculating that they are not dependent on an earlier, unissued store. To...
Franziska Roesner, Doug Burger, Stephen W. Keckler
IWCMC
2010
ACM
15 years 2 months ago
Modulation-adaptive cooperation in Rayleigh fading channels with imperfect CSI
Adaptive modulation can improve the throughput of cooperative communications, which has been shown in previous research. So far the adaptive modulation is applied with respect to ...
Yuanyuan Zhang, Yi Ma, Rahim Tafazolli