Sciweavers

909 search results - page 137 / 182
» The Economics of Large-Memory Computations
Sort
View
114
Voted
ICALP
2001
Springer
15 years 5 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
166
Voted
PLDI
1999
ACM
15 years 5 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
90
Voted
HOTOS
1999
IEEE
15 years 5 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
99
Voted
CP
1997
Springer
15 years 5 months ago
Heavy-Tailed Distributions in Combinatorial Search
Abstract. Combinatorial search methods often exhibit a large variability in performance. We study the cost pro les of combinatorial search procedures. Our study reveals some intrig...
Carla P. Gomes, Bart Selman, Nuno Crato
87
Voted
ACMICEC
2007
ACM
103views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Sampling of information goods
With the development of information technology and the emergence of electronic market places, great business opportunities are created with reduced spatial restraints, lowered sea...
Chong (Alex) Wang, Xiaoquan (Michael) Zhang