Sciweavers

2585 search results - page 219 / 517
» computing 1999
Sort
View
CCS
1999
ACM
15 years 8 months ago
Using Smartcards to Secure a Personalized Gambling Device
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
William Aiello, Aviel D. Rubin, Martin Strauss
ISCAS
1999
IEEE
79views Hardware» more  ISCAS 1999»
15 years 8 months ago
Energy minimization of system pipelines using multiple voltages
Modem computer and communication system design has to consider the timing constraints imposed by communication and system pipelines, and minimize the energy consumption. We adopt ...
Gang Qu, Darko Kirovski, Miodrag Potkonjak, Mani B...
COCO
1999
Springer
79views Algorithms» more  COCO 1999»
15 years 8 months ago
Non-Automatizability of Bounded-Depth Frege Proofs
In this paper, we show how to extend the argument due to Bonet, Pitassi and Raz to show that bounded-depth Frege proofs do not have feasible interpolation, assuming that factoring...
Maria Luisa Bonet, Carlos Domingo, Ricard Gavald&a...
COCOON
1999
Springer
15 years 8 months ago
A New Approach for Speeding Up Enumeration Algorithms and Its Application for Matroid Bases
Abstract: We propose a new approach for speeding up enumeration algorithms. The approach does not rely on data structures deeply, instead utilizes analysis of computation time. It ...
Takeaki Uno
COCOON
1999
Springer
15 years 8 months ago
Area Minimization for Grid Visibility Representation of Hierarchically Planar Graphs
Abstract. Hierarchical graphs are an important class of graphs for modelling many real applications in software and information visualization. In this paper, we shall investigate t...
Xuemin Lin, Peter Eades