Sciweavers

5344 search results - page 399 / 1069
» Privacy-Preserving Set Operations
Sort
View
DAC
1995
ACM
15 years 8 months ago
Hierarchical Optimization of Asynchronous Circuits
Abstract— Many asynchronous designs are naturally specified and implemented hierarchically as an interconnection of separate asynchronous modules that operate concurrently and c...
Bill Lin, Gjalt G. de Jong, Tilman Kolks
118
Voted
UIST
1995
ACM
15 years 8 months ago
SDM: Selective Dynamic Manipulation of Visualizations
In this paper we present a new set of interactive techniques for 2D and 3D visualizations. This set of techniques is called SDM (Selective Dynamic Manipulation). Selective, indica...
Mei C. Chuah, Steven F. Roth, Joe Mattis, John Kol...
AAAI
2007
15 years 7 months ago
A Deployed Semantically-Enabled Interdisciplinary Virtual Observatory
We have used semantic technologies to design, implement, and deploy an interdisciplinary virtual observatory. The Virtual Solar-Terrestrial Observatory is a production data framew...
Deborah L. McGuinness, Peter Fox, Luca Cinquini, P...
CAV
2008
Springer
158views Hardware» more  CAV 2008»
15 years 7 months ago
Linear Arithmetic with Stars
We consider an extension of integer linear arithmetic with a "star" operator takes closure under vector addition of the solution set of a linear arithmetic subformula. We...
Ruzica Piskac, Viktor Kuncak
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
15 years 6 months ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu