Sciweavers

203 search results - page 33 / 41
» Reconfigurable Sequential Consistency Algorithm
Sort
View
111
Voted
TC
2008
15 years 1 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
110
Voted
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
15 years 6 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
WWW
2002
ACM
16 years 1 months ago
A probabilistic approach to automated bidding in alternative auctions
This paper presents an approach to develop bidding agents that participate in multiple alternative auctions, with the goal of obtaining an item at the lowest price. The approach c...
Marlon Dumas, Lachlan Aldred, Guido Governatori, A...
83
Voted
DCC
2000
IEEE
15 years 5 months ago
Trees, Windows, and Tiles for Wavelet Image Compression
We investigate the task of compressing an image by using different probability models for compressing different regions of the image. In an earlier paper, we introduced a class of...
Wee Sun Lee
127
Voted
TEC
2002
119views more  TEC 2002»
15 years 23 days ago
Graph-based evolutionary design of arithmetic circuits
Abstract--In this paper, we present an efficient graph-based evolutionary optimization technique called evolutionary graph generation (EGG) and the proposed approach is applied to ...
Dingjun Chen, Takafumi Aoki, Naofumi Homma, Toshik...