Sciweavers

11949 search results - page 300 / 2390
» Some results on (a:b)-choosability
Sort
View
WMPI
2004
ACM
15 years 7 months ago
Cache organizations for clustered microarchitectures
Clustered microarchitectures are an effective organization to deal with the problem of wire delays and complexity by partitioning some of the processor resources. The organization ...
José González, Fernando Latorre, Ant...
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
PPSN
2004
Springer
15 years 7 months ago
Experimental Supplements to the Theoretical Analysis of EAs on Problems from Combinatorial Optimization
It is typical for the EA community that theory follows experiments. Most theoretical approaches use some model of the considered evolutionary algorithm (EA) but there is also some ...
Patrick Briest, Dimo Brockhoff, Bastian Degener, M...
110
Voted
STDBM
2004
Springer
127views Database» more  STDBM 2004»
15 years 7 months ago
Condition Evaluation for Speculative Systems: a Streaming Time Series Case
Application systems often need to react with certain actions whenever some preset conditions are satisfied. In many cases, the evaluation of these conditions takes long time, but...
Xiaoyang Sean Wang, Like Gao, Min Wang