Sciweavers

2200 search results - page 135 / 440
» The Generalized Pignistic Transformation
Sort
View
122
Voted
WDAG
2010
Springer
233views Algorithms» more  WDAG 2010»
14 years 11 months ago
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Abstract. Since in general it is NP-hard to solve the minimum dominating set problem even approximatively, a lot of work has been dedicated to central and distributed approximation...
Christoph Lenzen, Roger Wattenhofer
HIPEAC
2010
Springer
14 years 10 months ago
Buffer Sizing for Self-timed Stream Programs on Heterogeneous Distributed Memory Multiprocessors
Abstract. Stream programming is a promising way to expose concurrency to the compiler. A stream program is built from kernels that communicate only via point-to-point streams. The ...
Paul M. Carpenter, Alex Ramírez, Eduard Ayg...
LPAR
2010
Springer
14 years 10 months ago
Synthesis of Trigger Properties
In automated synthesis, we transform a specification into a system that is guaranteed to satisfy the specification. In spite of the rich theory developed for temporal synthesis, l...
Orna Kupferman, Moshe Y. Vardi
116
Voted
CVPR
2011
IEEE
14 years 9 months ago
A Theory of Multi-perspective Defocusing
We present a novel theory for characterizing defocus blurs in multi-perspective cameras such as catadioptric mirrors. Our approach studies how multi-perspective ray geometry trans...
Yuanyuan Ding, Jingyi Yu
83
Voted
IACR
2011
88views more  IACR 2011»
14 years 11 days ago
Targeted Malleability: Homomorphic Encryption for Restricted Computations
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perf...
Dan Boneh, Gil Segev, Brent Waters