Sciweavers

10718 search results - page 2057 / 2144
» On the Circuit Implementation Problem
Sort
View
STOC
1993
ACM
134views Algorithms» more  STOC 1993»
15 years 8 months ago
Quantum complexity theory
In this paper we study quantum computation from a complexity theoretic viewpoint. Our first result is the existence of an efficient universal quantum Turing machine in Deutsch’s...
Ethan Bernstein, Umesh V. Vazirani
STOC
1993
ACM
264views Algorithms» more  STOC 1993»
15 years 8 months ago
Contention in shared memory algorithms
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of ...
Cynthia Dwork, Maurice Herlihy, Orli Waarts
DBPL
1989
Springer
165views Database» more  DBPL 1989»
15 years 8 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
CDC
2009
IEEE
137views Control Systems» more  CDC 2009»
15 years 8 months ago
Control of ramp-up current profile dynamics in tokamak plasmas via the minimal-surface theory
The central task of current profile control during the ramp-up phase of a tokamak discharge is to find the actuator trajectories that are necessary to achieve certain desired curre...
Chao Xu, Eugenio Schuster
CCS
2007
ACM
15 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
« Prev « First page 2057 / 2144 Last » Next »