Sciweavers

523 search results - page 85 / 105
» On the Power of Quantum Proofs
Sort
View
CP
2007
Springer
15 years 6 months ago
Exploiting Past and Future: Pruning by Inconsistent Partial State Dominance
It has recently been shown, for the Constraint Satisfaction Problem (CSP), that the state associated with a node of the search tree built by a backtracking algorithm can be exploit...
Christophe Lecoutre, Lakhdar Sais, Sébastie...
IJCNN
2006
IEEE
15 years 5 months ago
Shaping Realistic Neuronal Morphologies: An Evolutionary Computation Method
— Neuronal morphology plays a crucial role in the information processing capabilities of neurons. Despite the importance of morphology for neural functionality, biological data i...
Ben Torben-Nielsen, Karl Tuyls, Eric O. Postma
MSWIM
2006
ACM
15 years 5 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
PPOPP
2006
ACM
15 years 5 months ago
Proving correctness of highly-concurrent linearisable objects
We study a family of implementations for linked lists using finegrain synchronisation. This approach enables greater concurrency, but correctness is a greater challenge than for ...
Viktor Vafeiadis, Maurice Herlihy, Tony Hoare, Mar...
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
15 years 5 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin