Sciweavers

7121 search results - page 152 / 1425
» Functions as Session-Typed Processes
Sort
View
ICCAD
2008
IEEE
127views Hardware» more  ICCAD 2008»
15 years 7 months ago
Verification of arithmetic datapaths using polynomial function models and congruence solving
Abstract— This paper addresses the problem of solving finite word-length (bit-vector) arithmetic with applications to equivalence verification of arithmetic datapaths. Arithmet...
Neal Tew, Priyank Kalla, Namrata Shekhar, Sivaram ...
SIGECOM
2009
ACM
114views ECommerce» more  SIGECOM 2009»
15 years 4 months ago
Policy teaching through reward function learning
Policy teaching considers a Markov Decision Process setting in which an interested party aims to influence an agent’s decisions by providing limited incentives. In this paper, ...
Haoqi Zhang, David C. Parkes, Yiling Chen
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
15 years 4 months ago
Using functional independence conditions to optimize the performance of latency-insensitive systems
—In latency-insensitive design shell modules are used to encapsulate system components (pearls) in order to interface them with the given latency-insensitive protocol and dynamic...
Cheng-Hong Li, Luca P. Carloni
IJCNN
2007
IEEE
15 years 4 months ago
Probability Density Function Estimation Using Orthogonal Forward Regression
— Using the classical Parzen window estimate as the target function, the kernel density estimation is formulated as a regression problem and the orthogonal forward regression tec...
Sheng Chen, Xia Hong, Chris J. Harris
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 4 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002