Sciweavers

530 search results - page 90 / 106
» Practical Threshold Signatures
Sort
View
201
Voted
ISCA
2010
IEEE
413views Hardware» more  ISCA 2010»
15 years 5 months ago
Resistive computation: avoiding the power wall with low-leakage, STT-MRAM based computing
As CMOS scales beyond the 45nm technology node, leakage concerns are starting to limit microprocessor performance growth. To keep dynamic power constant across process generations...
Xiaochen Guo, Engin Ipek, Tolga Soyata
100
Voted
FUN
2010
Springer
254views Algorithms» more  FUN 2010»
15 years 5 months ago
Christmas Gift Exchange Games
The Christmas gift exchange is a popular party game played around Christmas. Each participant brings a Christmas present to the party, and a random ordering of the participants, ac...
Arpita Ghosh, Mohammad Mahdian
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
15 years 4 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang
DAC
1999
ACM
15 years 4 months ago
IC Test Using the Energy Consumption Ratio
Dynamic-current based test techniques can potentially address the drawbacks of traditional and Iddq test methodologies. The quality of dynamic current based test is degraded by pr...
Wanli Jiang, Bapiraju Vinnakota
120
Voted
ACIVS
2009
Springer
15 years 3 months ago
Unsupervised Detection of Gradual Video Shot Changes with Motion-Based False Alarm Removal
The temporal segmentation of a video into shots is a fundamental prerequisite for video retrieval. There are two types of shot boundaries: abrupt shot changes (“cuts”) and grad...
Ralph Ewerth, Bernd Freisleben