Sciweavers

3134 search results - page 591 / 627
» Computing full disjunctions
Sort
View
93
Voted
FC
2008
Springer
90views Cryptology» more  FC 2008»
15 years 4 months ago
Practical Anonymous Divisible E-Cash from Bounded Accumulators
We present an efficient off-line divisible e-cash scheme which is truly anonymous without a trusted third party. This is the second scheme in the literature which achieves full unl...
Man Ho Au, Willy Susilo, Yi Mu
FMCAD
2008
Springer
15 years 3 months ago
Automatic Non-Interference Lemmas for Parameterized Model Checking
Parameterized model checking refers to any method that extends traditional, finite-state model checking to handle systems arbitrary number of processes. One popular approach to thi...
Jesse D. Bingham
IMC
2007
ACM
15 years 3 months ago
Network loss inference with second order statistics of end-to-end flows
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to existing works that use only the average end-to-end loss rates or strict temporal c...
Hung Xuan Nguyen, Patrick Thiran
FPGA
2008
ACM
136views FPGA» more  FPGA 2008»
15 years 3 months ago
HybridOS: runtime support for reconfigurable accelerators
We present HybridOS, a set of operating system extensions for supporting fine-grained reconfigurable accelerators integrated with general-purpose computing platforms. HybridOS spe...
John H. Kelm, Steven S. Lumetta
121
Voted
CIMAGING
2008
123views Hardware» more  CIMAGING 2008»
15 years 3 months ago
Non-homogeneous ICD optimization for targeted reconstruction of volumetric CT
Medical imaging typically requires the reconstruction of a limited region of interest (ROI) to obtain a high resolution image of the anatomy of interest. Although targeted reconst...
Zhou Yu, Jean-Baptiste Thibault, Charles A. Bouman...