Sciweavers

8437 search results - page 1642 / 1688
» Preferences over Sets
Sort
View
TC
2008
14 years 11 months ago
Hardware Implementation Trade-Offs of Polynomial Approximations and Interpolations
This paper examines the hardware implementation trade-offs when evaluating functions via piecewise polynomial approximations and interpolations for precisions of up to 24 bits. In ...
Dong-U Lee, Ray C. C. Cheung, Wayne Luk, John D. V...
INTR
2007
87views more  INTR 2007»
14 years 11 months ago
StarPlane - a national dynamic photonic network controlled by grid applications
Purpose – This paper aims to look at a research project – StarPlane –a national dynamic photonic network controlled by grid applications. Design/methodology/approach – The...
Paola Grosso, Li Xu, Jan-Philip Velders, Cees de L...
IPM
2007
106views more  IPM 2007»
14 years 11 months ago
Patent document categorization based on semantic structural information
The number of patent documents is currently rising rapidly worldwide, creating the need for an automatic categorization system to replace time-consuming and labor-intensive manual...
Jae-Ho Kim, Key-Sun Choi
ISCI
2007
108views more  ISCI 2007»
14 years 11 months ago
A degree-constrained QoS-aware routing algorithm for application layer multicast
Application layer multicast (ALM) provides a low-cost solution for multicast over the Internet. It overcomes the deployment hurdle of IP multicast by moving all multicast related ...
Baoliu Ye, Minyi Guo, Daoxu Chen, Sanglu Lu
TIT
2008
164views more  TIT 2008»
14 years 11 months ago
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes
We investigate the decoding problem of Reed-Solomon (RS) Codes, also known as the Polynomial Reconstruction Problem (PR), from a cryptographic hardness perspective. Namely, we dea...
Aggelos Kiayias, Moti Yung
« Prev « First page 1642 / 1688 Last » Next »