Sciweavers

546 search results - page 97 / 110
» On the Power of Secure Two-Party Computation
Sort
View
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 6 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
105
Voted
ICQNM
2008
IEEE
201views Chemistry» more  ICQNM 2008»
15 years 4 months ago
Loss-Tolerant Quantum Coin Flipping
Coin flipping is a cryptographic primitive in which two spatially separated players, who in principle do not trust each other, wish to establish a common random bit. If we limit ...
Guido Berlín, Gilles Brassard, Félix...
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 3 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
76
Voted
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
74
Voted
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
15 years 3 months ago
VLSI CAD tool protection by birthmarking design solutions
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Lin Yuan, Gang Qu, Ankur Srivastava