Sciweavers

2335 search results - page 334 / 467
» Functional Differentiation of Computer Programs
Sort
View
119
Voted
ICALP
2007
Springer
15 years 8 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
134
Voted
ICN
2007
Springer
15 years 8 months ago
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks
— In this paper, we use the Markov Decision Process (MDP) technique to find the optimal code allocation policy in High-Speed Downlink Packet Access (HSDPA) networks. A discrete ...
Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadar...
96
Voted
FCCM
2006
IEEE
106views VLSI» more  FCCM 2006»
15 years 8 months ago
Defect-Tolerant Nanocomputing Using Bloom Filters
We propose a novel defect-tolerant design methodology using Bloom filters for defect mapping for nanoscale computing devices. It is a general approach that can be used for any pe...
Gang Wang, Wenrui Gong, Ryan Kastner
ACL2
2006
ACM
15 years 8 months ago
Soundness of the simply typed lambda calculus in ACL2
To make it practical to mechanize proofs in programming language metatheory, several capabilities are required of the theorem proving framework. One must be able to represent and ...
Sol Swords, William R. Cook
117
Voted
RTA
2005
Springer
15 years 8 months ago
Natural Narrowing for General Term Rewriting Systems
Abstract. For narrowing to be an efficient evaluation mechanism, several lazy narrowing strategies have been proposed, although typically for the restricted case of left-linear con...
Santiago Escobar, José Meseguer, Prasanna T...