Sciweavers

15782 search results - page 3069 / 3157
» Network Optimization and Control
Sort
View
ASIACRYPT
2007
Springer
15 years 7 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...
ATAL
2006
Springer
15 years 7 months ago
Resource allocation among agents with preferences induced by factored MDPs
Distributing scarce resources among agents in a way that maximizes the social welfare of the group is a computationally hard problem when the value of a resource bundle is not lin...
Dmitri A. Dolgov, Edmund H. Durfee
CODES
2004
IEEE
15 years 7 months ago
Power analysis of system-level on-chip communication architectures
For complex System-on-chips (SoCs) fabricated in nanometer technologies, the system-level on-chip communication architecture is emerging as a significant source of power consumpti...
Kanishka Lahiri, Anand Raghunathan
DAC
2004
ACM
15 years 7 months ago
A methodology to improve timing yield in the presence of process variations
The ability to control the variations in IC fabrication process is rapidly diminishing as feature sizes continue towards the sub-100 nm regime. As a result, there is an increasing...
Sreeja Raj, Sarma B. K. Vrudhula, Janet Meiling Wa...
FASE
2006
Springer
15 years 6 months ago
Argus: Online Statistical Bug Detection
Statistical debugging is a powerful technique for identifying bugs that do not violate programming rules or program invariants. Previously known statistical debugging techniques ar...
Long Fei, Kyungwoo Lee, Fei Li, Samuel P. Midkiff
« Prev « First page 3069 / 3157 Last » Next »