Sciweavers

7379 search results - page 1256 / 1476
» How Many Clusters
Sort
View
USS
2010
15 years 1 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
ICCAD
2009
IEEE
131views Hardware» more  ICCAD 2009»
15 years 1 months ago
Scheduling with soft constraints
In a behavioral synthesis system, a typical approach used to guide the scheduler is to impose hard constraints on the relative timing between operations considering performance, a...
Jason Cong, Bin Liu, Zhiru Zhang
COMGEO
2010
ACM
15 years 1 months ago
A new paradigm for integrated environmental monitoring
The vision of an integrated Earth observation system to help protect and sustain the planet and its inhabitants is significant and timely, and thus has been identified recently by...
Kevin Montgomery, Carsten W. Mundt
145
Voted
CONSTRAINTS
2010
153views more  CONSTRAINTS 2010»
15 years 1 months ago
Philosophy of the MiniZinc challenge
MiniZinc arose as a response to the extended discussion at CP2006 of the need for a standard modelling language for CP. This is a challenging problem, and we believe MiniZinc makes...
Peter J. Stuckey, Ralph Becket, Julien Fischer
ECCC
2011
223views ECommerce» more  ECCC 2011»
14 years 11 months ago
A Case of Depth-3 Identity Testing, Sparse Factorization and Duality
Polynomial identity testing (PIT) problem is known to be challenging even for constant depth arithmetic circuits. In this work, we study the complexity of two special but natural ...
Chandan Saha, Ramprasad Saptharishi, Nitin Saxena
« Prev « First page 1256 / 1476 Last » Next »