Sciweavers

7329 search results - page 4 / 1466
» Network Extractor Protocols
Sort
View
OOPSLA
1999
Springer
13 years 11 months ago
Practical Experience with an Application Extractor for Java
Java programs are routinely transmitted over low-bandwidth network connections as compressed class le archives (i.e., zip les and jar les). Since archive size is directly proporti...
Frank Tip, Chris Laffra, Peter F. Sweeney, David S...
ASPDAC
2008
ACM
108views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Synthesis and design of parameter extractors for low-power pre-computation-based content-addressable memory using gate-block sel
Content addressable memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing, and networking, that require high-speed searches due t...
Jui-Yuan Hsieh, Shanq-Jang Ruan
STOC
2002
ACM
80views Algorithms» more  STOC 2002»
14 years 7 months ago
Strict polynomial-time in simulation and extraction
The notion of efficient computation is usually identified in cryptography and complexity with (strict) probabilistic polynomial time. However, until recently, in order to obtain c...
Boaz Barak, Yehuda Lindell
COCO
2009
Springer
155views Algorithms» more  COCO 2009»
14 years 1 months ago
Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma
—A simple averaging argument shows that given a randomized algorithm A and a function f such that for every input x, Pr[A(x) = f(x)] ≥ 1−ρ (where the probability is over the...
Ronen Shaltiel
JCIT
2010
156views more  JCIT 2010»
13 years 1 months ago
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection
Artificial Neural Networks(ANNS) have top level of capability to progress the estimation of cracks in metal tubes. The aim of this paper is to propose an algorithm to identify mod...
Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mo...