Sciweavers

2610 search results - page 33 / 522
» Computational Probabilistic Non-interference
Sort
View
TSMC
2002
134views more  TSMC 2002»
13 years 8 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
14 years 5 months ago
A Probabilistic-Based Design Methodology for Nanoscale Computation
As current silicon-based techniques fast approach their practical limits, the investigation of nanoscale electronics, devices and system architectures becomes a central research p...
R. Iris Bahar, Joseph L. Mundy, Jie Chen
STACS
1999
Springer
14 years 1 months ago
One-sided Versus Two-sided Error in Probabilistic Computation
We demonstrate how to use Lautemann's proof that BPP is in p 2 to exhibit that BPP is in RPPromiseRP. Immediate consequences show that if PromiseRP is easy or if there exist q...
Harry Buhrman, Lance Fortnow