Sciweavers

1585 search results - page 104 / 317
» Automatically optimizing secure computation
Sort
View
ISQED
2009
IEEE
112views Hardware» more  ISQED 2009»
14 years 2 months ago
Estimation and optimization of reliability of noisy digital circuits
— With continued scaling, reliability is emerging as a critical challenge for the designers of digital circuits. The challenge stems in part from the lack of computationally ef...
Satish Sivaswamy, Kia Bazargan, Marc D. Riedel
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 8 months ago
Optimal Path Planning under Temporal Logic Constraints
Abstract-- In this paper we present a method for automatically generating optimal robot trajectories satisfying high level mission specifications. The motion of the robot in the en...
Stephen L. Smith, Jana Tumova, Calin Belta, Daniel...
ICIP
2006
IEEE
14 years 9 months ago
End-to-End Rate-Distortion Optimized Motion Estimation
An end-to-end rate-distortion optimized motion estimation method for robust video coding in lossy networks is proposed. In this method the expected reconstructed distortion after ...
Shuai Wan, Ebroul Izquierdo, Fuzheng Yang, Yilin C...
CF
2010
ACM
14 years 1 months ago
Exposing parallelism and locality in a runtime parallel optimization framework
Runtime parallel optimization has been suggested as a means to overcome the difficulties of parallel programming. For runtime parallel optimization to be effective, parallelism a...
David A. Penry, Daniel J. Richins, Tyler S. Harris...
ICDCSW
2003
IEEE
14 years 1 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako