Sciweavers

7106 search results - page 1202 / 1422
» Restricted Complexity, General Complexity
Sort
View
133
Voted
EUROCRYPT
2010
Springer
15 years 10 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
147
Voted
GECCO
2010
Springer
155views Optimization» more  GECCO 2010»
15 years 10 months ago
Negative selection algorithms without generating detectors
Negative selection algorithms are immune-inspired classifiers that are trained on negative examples only. Classification is performed by generating detectors that match none of ...
Maciej Liskiewicz, Johannes Textor
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 10 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
123
Voted
CDC
2009
IEEE
151views Control Systems» more  CDC 2009»
15 years 9 months ago
A poset framework to model decentralized control problems
— In this paper we use partially ordered sets (posets) to study decentralized control problems arising in different settings. We show that time delayed systems with certain dela...
Parikshit Shah, Pablo A. Parrilo
143
Voted
HIPEAC
2009
Springer
15 years 9 months ago
Revisiting Cache Block Superloading
Abstract. Technological advances and increasingly complex and dynamic application behavior argue for revisiting mechanisms that adapt logical cache block size to application charac...
Matthew A. Watkins, Sally A. McKee, Lambert Schael...
« Prev « First page 1202 / 1422 Last » Next »