Sciweavers

465 search results - page 32 / 93
» Programmable Hash Functions and Their Applications
Sort
View
ICPP
1995
IEEE
15 years 1 months ago
The Application of Skewed-Associative Memories to Cache Only Memory Architectures
— Skewed-associative caches use several hash functions to reduce collisions in caches without increasing the associativity. This technique can increase the hit ratio of a cache w...
Henk L. Muller, Paul W. A. Stallard, David H. D. W...
APPINF
2003
14 years 11 months ago
Why Functional Programming Really Matters
The significance of functional programming is revealed as that the feasible approach to language extensibility which it enables is further applicable to programming in general and...
Paul A. Bailes, Colin J. M. Kemp, Ian Peake, Sean ...
LOBJET
2000
134views more  LOBJET 2000»
14 years 9 months ago
Transparent Dynamic Database Evolution from Java
: With the increasing provision by the ODMG standard and commercial OODBMS products for transparent access to the traditional database functionality of an OODBMS from Java, there i...
Awais Rashid, Peter Sawyer
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 3 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
FPGA
1998
ACM
146views FPGA» more  FPGA 1998»
15 years 2 months ago
Boolean Matching for Complex PLBs in LUT-based FPGAs with Application to Architecture Evaluation
In this paper, we developed Boolean matching techniques for complex programmable logic blocks (PLBs) in LUT-based FPGAs. A complex PLB can not only be used as a K-input LUT, but a...
Jason Cong, Yean-Yow Hwang