Sciweavers

17288 search results - page 3201 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
168
Voted
CODES
2009
IEEE
15 years 9 months ago
TotalProf: a fast and accurate retargetable source code profiler
Profilers play an important role in software/hardware design, optimization, and verification. Various approaches have been proposed to implement profilers. The most widespread app...
Lei Gao, Jia Huang, Jianjiang Ceng, Rainer Leupers...
FOCS
2009
IEEE
15 years 8 months ago
Space-Efficient Framework for Top-k String Retrieval Problems
Given a set D = {d1, d2, ..., dD} of D strings of total length n, our task is to report the "most relevant" strings for a given query pattern P. This involves somewhat mo...
Wing-Kai Hon, Rahul Shah, Jeffrey Scott Vitter
143
Voted
ASIACRYPT
2006
Springer
15 years 8 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
15 years 5 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
170
Voted
CN
2007
111views more  CN 2007»
15 years 5 months ago
An auction mechanism for allocating the bandwidth of networks to their users
We present a mechanism for auctioning bandwidth on a network-wide basis to end users or ISPs that will utilize it for the same time period. This mechanism consists of a set of sim...
Manos Dramitinos, George D. Stamoulis, Costas Cour...
« Prev « First page 3201 / 3458 Last » Next »