Sciweavers

2252 search results - page 189 / 451
» Improving Random Forests
Sort
View
176
Voted
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
ATS
2000
IEEE
98views Hardware» more  ATS 2000»
15 years 7 months ago
Embedded core testing using genetic algorithms
Testing of embedded cores is very difficult in SOC (system-on-a-chip), since the core user may not know the gate level implementation of the core, and the controllability and obse...
Ruofan Xu, Michael S. Hsiao
ICCD
2000
IEEE
120views Hardware» more  ICCD 2000»
15 years 7 months ago
Equivalence Checking Combining a Structural SAT-Solver, BDDs, and Simulation
This paper presents a verification technique for functional comparison of large combinational circuits using a novel combination of known approaches. The idea is based on a tight...
Viresh Paruthi, Andreas Kuehlmann
107
Voted
STOC
1999
ACM
85views Algorithms» more  STOC 1999»
15 years 7 months ago
A Theorem on Sensitivity and Applications in Private Computation
In this paper we prove a theorem that gives an (almost) tight upper bound on the sensitivity of a multiple-output Boolean function in terms of the sensitivity of its coordinates an...
Anna Gál, Adi Rosén
87
Voted
ICDCS
1999
IEEE
15 years 7 months ago
Interpreting Stale Load Information
In this paper we examine the problem of balancing load in a large-scale distributed system when information about server loads may be stale. It is well known that sending each req...
Michael Dahlin