Sciweavers

3238 search results - page 408 / 648
» Not Enough Points Is Enough
Sort
View
WSC
2008
15 years 3 months ago
Knowledge-based event control for flow-shops using simulation and rules
The requirements on production systems and their planning and control systems are constantly growing. Systems have to be flexible and provide viable solutions at the same time. Di...
Mark Aufenanger, Wilhelm Dangelmaier, Christoph La...
67
Voted
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
15 years 2 months ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan
ASIACRYPT
2008
Springer
15 years 2 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
98
Voted
ASPDAC
2008
ACM
122views Hardware» more  ASPDAC 2008»
15 years 2 months ago
LP based white space redistribution for thermal via planning and performance optimization in 3D ICs
: Thermal issue is a critical challenge in 3D IC circuit design. Incorporating thermal vias into 3D IC is a promising way to mitigate thermal issues by lowering down the thermal re...
Xin Li, Yuchun Ma, Xianlong Hong, Sheqin Dong, Jas...
100
Voted
ATAL
2008
Springer
15 years 2 months ago
Achieving efficient and equitable collaboration among selfish agents using spender-signed currency
We study collaboration among selfish agents in the tactical airport planning domain. This can be seen as a social exchange scenario, in which the efforts of performing tasks are t...
Geert Jonker, Frank Dignum, John-Jules Ch. Meyer