Sciweavers

3898 search results - page 253 / 780
» On the Bit Extraction Problem
Sort
View
127
Voted
TVLSI
2010
14 years 10 months ago
Asynchronous Data-Driven Circuit Synthesis
A method is described for synthesizing asynchronous circuits based on the Handshake Circuit paradigm but employing a data-driven, rather than a control-driven, style. This approach...
Sam Taylor, Doug A. Edwards, Luis A. Plana, Luis A...
CISS
2010
IEEE
14 years 7 months ago
On the symmetric capacity of the K-user symmetric cyclic Gaussian interference channel
Abstract—The capacity region of Gaussian interference channel in the weak interference regime is an open problem. Recently, Etkin, Tse and Wang derived an outer bound for the two...
Lei Zhou, Wei Yu
163
Voted
PKC
2011
Springer
169views Cryptology» more  PKC 2011»
14 years 6 months ago
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
At TCC 2005, Groth underlined the usefulness of working in small RSA subgroups of hidden order. In assessing the security of the relevant hard problems, however, the best attack co...
Jean-Sébastien Coron, Antoine Joux, Avradip...
156
Voted
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
13 years 5 months ago
Sketching valuation functions
Motivated by the problem of querying and communicating bidders’ valuations in combinatorial auctions, we study how well different classes of set functions can be sketched. More...
Ashwinkumar Badanidiyuru, Shahar Dobzinski, Hu Fu,...
STOC
2009
ACM
146views Algorithms» more  STOC 2009»
16 years 4 months ago
Conditional hardness for satisfiable 3-CSPs
In this paper we study a fundamental open problem in the area of probabilistic checkable proofs: What is the smallest s such that NP naPCP1,s[O(log n), 3]? In the language of har...
Ryan O'Donnell, Yi Wu