Sciweavers

91 search results - page 9 / 19
» Models For Dependable Computation with Multiple Inputs and S...
Sort
View
ICS
2010
Tsinghua U.
14 years 6 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
SLIP
2005
ACM
14 years 2 months ago
Congestion prediction in early stages
Routability optimization has become a major concern in the physical design cycle of VLSI circuits. Due to the recent advances in VLSI technology, interconnect has become a dominan...
Chiu-Wing Sham, Evangeline F. Y. Young
JPDC
2007
184views more  JPDC 2007»
13 years 8 months ago
Modeling of concurrent web sessions with bounded inconsistency in shared data
Client interactions with modern web-accessible network services are typically organized into sessions involving multiple requests that read and write shared application data. Ther...
Alexander Totok, Vijay Karamcheti
CGF
2008
151views more  CGF 2008»
13 years 8 months ago
Reconstructing head models from photographs for individualized 3D-audio processing
Visual fidelity and interactivity are the main goals in Computer Graphics research, but recently also audio is assuming an important role. Binaural rendering can provide extremely...
Matteo Dellepiane, Nico Pietroni, Tsingos Tsingos,...
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
14 years 2 months ago
Combining partitions by probabilistic label aggregation
Data clustering represents an important tool in exploratory data analysis. The lack of objective criteria render model selection as well as the identification of robust solutions...
Tilman Lange, Joachim M. Buhmann