Sciweavers

9787 search results - page 1926 / 1958
» A Utile Function Optimizer
Sort
View
CRYPTO
2006
Springer
111views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
We address the message authentication problem in two seemingly different communication models. In the first model, the sender and receiver are connected by an insecure channel and...
Moni Naor, Gil Segev, Adam Smith
MICCAI
2000
Springer
13 years 11 months ago
Fixation-Based Surgery: A New Technique for Distal Radius Osteotomy
Abstract. Fixation-based surgery is a new technique for achieving difficult corrections in some orthopedic procedures. The method is premised on using a fixation device, such as a ...
H. Croitoru, Randy E. Ellis, Carolyn F. Small, Dav...
COLT
1995
Springer
13 years 11 months ago
Regression NSS: An Alternative to Cross Validation
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
Michael P. Perrone, Brian S. Blais
ICCAD
1995
IEEE
135views Hardware» more  ICCAD 1995»
13 years 11 months ago
An iterative improvement algorithm for low power data path synthesis
We address the problem of minimizing power consumption in behavioral synthesis of data-dominated circuits. The complex nature of power as a cost function implies that the effects ...
Anand Raghunathan, Niraj K. Jha
VLDB
1987
ACM
90views Database» more  VLDB 1987»
13 years 11 months ago
Index Access with a Finite Buffer
: A buffer is a main-memory area used to reduce accessto disks. The buffer holds pages from secondary storage files. A processrequesting a page causesa fault if the pageis not in t...
Giovanni Maria Sacco
« Prev « First page 1926 / 1958 Last » Next »