Sciweavers

5793 search results - page 1059 / 1159
» Individual communication complexity
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
14 years 4 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research field with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
MOBICOM
2009
ACM
14 years 4 months ago
A scalable micro wireless interconnect structure for CMPs
This paper describes an unconventional way to apply wireless networking in emerging technologies. It makes the case for using a two-tier hybrid wireless/wired architecture to inte...
Suk-Bok Lee, Sai-Wang Tam, Ioannis Pefkianakis, So...
CDC
2008
IEEE
14 years 4 months ago
Enabling bio-feedback using real-time fMRI
— Despite the enormous complexity of the human mind, fMRI techniques are able to partially observe the state of a brain in action. In this paper we describe an experimental setup...
Henrik Ohlsson, Joakim Rydell, Anders Brun, Jacob ...
CODES
2008
IEEE
14 years 4 months ago
Distributed flit-buffer flow control for networks-on-chip
The combination of flit-buffer flow control methods and latency-insensitive protocols is an effective solution for networks-on-chip (NoC). Since they both rely on backpressure...
Nicola Concer, Michele Petracca, Luca P. Carloni
« Prev « First page 1059 / 1159 Last » Next »