Sciweavers

17789 search results - page 3397 / 3558
» Exceptional Use Cases
Sort
View
FOCS
2006
IEEE
15 years 10 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
FOCS
2006
IEEE
15 years 10 months ago
On the Quantum Query Complexity of Local Search in Two and Three Dimensions
The quantum query complexity of searching for local optima has been a subject of much interest in the recent literature. For the d-dimensional grid graphs, the complexity has been...
Xiaoming Sun, Andrew Chi-Chih Yao
GLOBECOM
2006
IEEE
15 years 10 months ago
Sum Rate Maximization and Transmit Power Minimization for Multi-User Orthogonal Space Division Multiplexing
—We demonstrate that receive antenna selection (RAS) provides significant increase in the achievable sum rates for multi-user MIMO wireless downlinks that employ block diagonaliz...
Boon Chin Lim, Christian Schlegel, Witold A. Krzym...
158
Voted
ICDM
2006
IEEE
130views Data Mining» more  ICDM 2006»
15 years 10 months ago
A Framework for Regional Association Rule Mining in Spatial Datasets
The immense explosion of geographically referenced data calls for efficient discovery of spatial knowledge. One critical requirement for spatial data mining is the capability to ...
Wei Ding 0003, Christoph F. Eick, Jing Wang 0007, ...
ICPADS
2006
IEEE
15 years 10 months ago
Destination-Based HoL Blocking Elimination
Congestion management is likely to become a critical issue in interconnection networks, as increasing power consumption and cost concerns will lead to the use of smaller networks....
T. Nachiondo, Jose Flich, José Duato
« Prev « First page 3397 / 3558 Last » Next »