Sciweavers

4325 search results - page 761 / 865
» Incremental computation with names
Sort
View
MOBISYS
2008
ACM
15 years 1 months ago
Community sensor grids: virtualization for sharing across domains
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...
CF
2005
ACM
15 years 1 months ago
Evaluation of extended dictionary-based static code compression schemes
This paper evaluates how much extended dictionary-based code compression techniques can reduce the static code size. In their simplest form, such methods statically identify ident...
Martin Thuresson, Per Stenström
DAC
2006
ACM
15 years 1 months ago
Systematic software-based self-test for pipelined processors
Software-based self-test (SBST) has recently emerged as an effective methodology for the manufacturing test of processors and other components in systems-on-chip (SoCs). By moving ...
Mihalis Psarakis, Dimitris Gizopoulos, Miltiadis H...
CIDR
2003
125views Algorithms» more  CIDR 2003»
15 years 17 days ago
Crossing the Structure Chasm
It has frequently been observed that most of the world’s data lies outside database systems. The reason is that database systems focus on structured data, leaving the unstructur...
Alon Y. Halevy, Oren Etzioni, AnHai Doan, Zachary ...
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
15 years 8 days ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan