Sciweavers

542 search results - page 70 / 109
» The Denjoy alternative for computable functions
Sort
View
ASIACRYPT
2011
Springer
14 years 1 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
MP
2006
87views more  MP 2006»
15 years 1 months ago
Convexity and decomposition of mean-risk stochastic programs
Abstract. Traditional stochastic programming is risk neutral in the sense that it is concerned with the optimization of an expectation criterion. A common approach to addressing ri...
Shabbir Ahmed
VLDB
1997
ACM
170views Database» more  VLDB 1997»
15 years 5 months ago
M-tree: An Efficient Access Method for Similarity Search in Metric Spaces
A new access method, called M-tree, is proposed to organize and search large data sets from a generic "metric space", i.e. where object proximity is only defined by a di...
Paolo Ciaccia, Marco Patella, Pavel Zezula
ICWN
2007
15 years 3 months ago
Comparing Agent Paradigms for Resource Management in Sensor Networks
— Management of power and other resources that effect field life is an important consideration in sensor networks. This paper presents and compares alternative agent paradigms ap...
Anish Anthony, Thomas C. Jannett
FPL
2004
Springer
144views Hardware» more  FPL 2004»
15 years 5 months ago
A Methodology for Energy Efficient FPGA Designs Using Malleable Algorithms
A recent trend towards integrating FPGAs with many heterogeneous components, such as memory systems, dedicated multipliers, etc., has made them an attractive option for implementin...
Jingzhao Ou, Viktor K. Prasanna