Sciweavers

490 search results - page 34 / 98
» Equivalent Keys of HPC
Sort
View
ENTCS
2006
168views more  ENTCS 2006»
13 years 8 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
DKE
2002
113views more  DKE 2002»
13 years 8 months ago
A general strategy for decomposing topological invariants of spatial databases and an application
Topological invariants of spatial databases (i.e., finite structures that capture the topological properties of the database) are receiving increasing attention since they can act...
Serafino Cicerone, Daniele Frigioni, Paolino Di Fe...
ICALP
2010
Springer
14 years 1 months ago
Tight Thresholds for Cuckoo Hashing via XORSAT
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a s...
Martin Dietzfelbinger, Andreas Goerdt, Michael Mit...
ECCV
2002
Springer
14 years 10 months ago
Constructing Illumination Image Basis from Object Motion
We propose to construct a 3D linear image basis which spans an image space of arbitrary illumination conditions, from images of a moving object observed under a static lighting con...
Akiko Nakashima, Atsuto Maki, Kazuhiro Fukui
STOC
2005
ACM
93views Algorithms» more  STOC 2005»
14 years 9 months ago
Representing hard lattices with O(n log n) bits
We present a variant of the Ajtai-Dwork public-key cryptosystem where the size of the public-key is only O(n log n) bits and the encrypted text/clear text ratio is also O(n log n)...
Miklós Ajtai