Sciweavers

813 search results - page 25 / 163
» On the interaction between sharing and linearity
Sort
View
PC
2010
145views Management» more  PC 2010»
14 years 9 months ago
GPU computing with Kaczmarz's and other iterative algorithms for linear systems
The graphics processing unit (GPU) is used to solve large linear systems derived from partial differential equations. The differential equations studied are strongly convection-...
Joseph M. Elble, Nikolaos V. Sahinidis, Panagiotis...
CDC
2009
IEEE
139views Control Systems» more  CDC 2009»
15 years 4 months ago
Reachability analysis for continuous systems under shared control: Application to user-interface design
— We extend techniques for a reachability-based ion to continuous systems under shared control, that is, systems which have both inputs controlled by the automation and inputs co...
Nikolai Matni, Meeko Oishi
ISADS
1999
IEEE
15 years 3 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
15 years 3 months ago
Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach
Future Systems-on-Chips will include multiple heterogeneous processing units, with complex data-dependent shared resource access patterns dictating the performance of a design. Cu...
Alex Bobrek, Joshua J. Pieper, Jeffrey E. Nelson, ...
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
15 years 3 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang