Sciweavers

272 search results - page 8 / 55
» Exploring the acceptability envelope
Sort
View
TCC
2005
Springer
103views Cryptology» more  TCC 2005»
15 years 3 months ago
Fair-Zero Knowledge
Abstract. We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifi...
Matt Lepinski, Silvio Micali, Abhi Shelat
ASWC
2006
Springer
15 years 1 months ago
Design of Semantically Interoperable Adverse Event Reporting Framework
Patient safety is one of the most significant issues not only to medical providers but also to the general public. Despite the widespread recognition of the adverse event reporting...
Senator Jeong, Hong-Gee Kim
DATE
2004
IEEE
109views Hardware» more  DATE 2004»
15 years 1 months ago
RTL Processor Synthesis for Architecture Exploration and Implementation
Architecture description languages are widely used to perform architecture exploration for application-driven designs, whereas the RT-level is the commonly accepted level for hard...
Oliver Schliebusch, Anupam Chattopadhyay, Rainer L...
VLSISP
2008
134views more  VLSISP 2008»
14 years 9 months ago
Calibration of Abstract Performance Models for System-Level Design Space Exploration
ion of Abstract Performance Models for System-Level Design Space Exploration ANDY D. PIMENTEL, MARK THOMPSON, SIMON POLSTRA AND CAGKAN ERBAS Computer Systems Architecture Group, In...
Andy D. Pimentel, Mark Thompson, Simon Polstra, Ca...
ECIR
2011
Springer
14 years 1 months ago
Balancing Exploration and Exploitation in Learning to Rank Online
Abstract. As retrieval systems become more complex, learning to rank approaches are being developed to automatically tune their parameters. Using online learning to rank approaches...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke