Sciweavers

4761 search results - page 808 / 953
» Generalizing Boundary Points
Sort
View
115
Voted
NDSS
2008
IEEE
15 years 7 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
107
Voted
CODES
2007
IEEE
15 years 7 months ago
Performance modeling for early analysis of multi-core systems
Performance analysis of microprocessors is a critical step in defining the microarchitecture, prior to register-transfer-level (RTL) design. In complex chip multiprocessor systems...
Reinaldo A. Bergamaschi, Indira Nair, Gero Dittman...
FOCS
2007
IEEE
15 years 7 months ago
On the Hardness and Smoothed Complexity of Quasi-Concave Minimization
In this paper, we resolve the smoothed and approximative complexity of low-rank quasi-concave minimization, providing both upper and lower bounds. As an upper bound, we provide th...
Jonathan A. Kelner, Evdokia Nikolova
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
15 years 7 months ago
Reaction Mass Pendulum (RMP): An explicit model for centroidal angular momentum of humanoid robots
Abstract— A number of conceptually simple but behaviorrich “inverted pendulum” humanoid models have greatly enhanced the understanding and analytical insight of humanoid dyna...
Sung-Hee Lee, Ambarish Goswami
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
15 years 7 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth