Sciweavers

5344 search results - page 301 / 1069
» Privacy-Preserving Set Operations
Sort
View
IOLTS
2002
IEEE
148views Hardware» more  IOLTS 2002»
15 years 9 months ago
Active Replication: Towards a Truly SRAM-Based FPGA On-Line Concurrent Testing
The reusing of the same hardware resources to implement speed-critical algorithms, without interrupting system operation, is one of the main reasons for the increasing use of reco...
Manuel G. Gericota, Gustavo R. Alves, Miguel L. Si...
ISSS
2002
IEEE
103views Hardware» more  ISSS 2002»
15 years 9 months ago
A Symbolic Approach for the Combined Solution of Scheduling and Allocation
Scheduling is widely recognized as a very important step in highlevel synthesis. Nevertheless, it is usually done without taking into account the effects on the actual hardware im...
Luciano Lavagno, Mihai T. Lazarescu, Stefano Quer,...
CONCUR
2001
Springer
15 years 8 months ago
Symbolic Computation of Maximal Probabilistic Reachability
We study the maximal reachability probability problem for infinite-state systems featuring both nondeterministic and probabilistic choice. The problem involves the computation of ...
Marta Z. Kwiatkowska, Gethin Norman, Jeremy Sprost...
PPDP
2001
Springer
15 years 8 months ago
Cycle Therapy: A Prescription for Fold and Unfold on Regular Trees
Cyclic data structures can be tricky to create and manipulate in declarative programming languages. In a declarative setting, a natural way to view cyclic structures is as denotin...
Franklyn A. Turbak, J. B. Wells
VLDB
2001
ACM
86views Database» more  VLDB 2001»
15 years 8 months ago
Intelligent Rollups in Multidimensional OLAP Data
In this paper we propose a new operator for advanced exploration of large multidimensional databases. The proposed operator can automatically generalize from a specific problem c...
Gayatri Sathe, Sunita Sarawagi