Sciweavers

4761 search results - page 808 / 953
» Generalizing Boundary Points
Sort
View
140
Voted
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
CODES
2007
IEEE
15 years 10 months ago
Performance modeling for early analysis of multi-core systems
Performance analysis of microprocessors is a critical step in defining the microarchitecture, prior to register-transfer-level (RTL) design. In complex chip multiprocessor systems...
Reinaldo A. Bergamaschi, Indira Nair, Gero Dittman...
131
Voted
FOCS
2007
IEEE
15 years 10 months ago
On the Hardness and Smoothed Complexity of Quasi-Concave Minimization
In this paper, we resolve the smoothed and approximative complexity of low-rank quasi-concave minimization, providing both upper and lower bounds. As an upper bound, we provide th...
Jonathan A. Kelner, Evdokia Nikolova
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
15 years 10 months ago
Reaction Mass Pendulum (RMP): An explicit model for centroidal angular momentum of humanoid robots
Abstract— A number of conceptually simple but behaviorrich “inverted pendulum” humanoid models have greatly enhanced the understanding and analytical insight of humanoid dyna...
Sung-Hee Lee, Ambarish Goswami
139
Voted
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
15 years 10 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth