Sciweavers

3238 search results - page 136 / 648
» Multi-return function call
Sort
View
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 8 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
VLSID
2003
IEEE
134views VLSI» more  VLSID 2003»
14 years 8 months ago
A Framework for Energy and Transient Power Reduction during Behavioral Synthesis
Abstract-- In battery driven portable applications, the minimization of energy, average power, peak power, and peak power differential are equally important to improve reliability ...
Saraju P. Mohanty, N. Ranganathan
PERCOM
2005
ACM
14 years 7 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
CVPR
2010
IEEE
14 years 4 months ago
Boundary Learning by Optimization with Topological Constraints
Recent studies have shown that machine learning can improve the accuracy of detecting object boundaries in images. In the standard approach, a boundary detector is trained by mini...
Viren Jain, Benjamin Bollmann, Bobby Kasthuri, Ken...
CEC
2009
IEEE
14 years 2 months ago
Differential Evolution with Laplace mutation operator
— Differential Evolution (DE) is a novel evolutionary approach capable of handling non-differentiable, non-linear and multi-modal objective functions. DE has been consistently ra...
Millie Pant, Radha Thangaraj, Ajith Abraham, Crina...