Sciweavers

2778 search results - page 98 / 556
» Limit complexities revisited
Sort
View
COMPLEXITY
2010
145views more  COMPLEXITY 2010»
15 years 1 months ago
Acceleration beyond the wave speed in dissipative wave-particle systems
When an isotropic object is accelerated by plane waves, its limiting speed is less or equal to the wave speed. We study the acceleration of anisotropic objects in classical wave-p...
Dene Farrell, Alfred Hübler, Joseph Brewer, I...
PODS
2010
ACM
242views Database» more  PODS 2010»
15 years 9 months ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak
ASIACRYPT
2010
Springer
15 years 2 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
114
Voted
ISLPED
1998
ACM
95views Hardware» more  ISLPED 1998»
15 years 8 months ago
The petrol approach to high-level power estimation
High-level power estimation is essential for designing complex low-power ICs. However, the lack of flexibility, or restriction to synthesizable code of previously presented high-...
Rafael Peset Llopis, Kees G. W. Goossens
ISCA
2005
IEEE
101views Hardware» more  ISCA 2005»
15 years 10 months ago
Virtualizing Transactional Memory
Writing concurrent programs is difficult because of the complexity of ensuring proper synchronization. Conventional lock-based synchronization suffers from wellknown limitations, ...
Ravi Rajwar, Maurice Herlihy, Konrad K. Lai