Sciweavers

532 search results - page 67 / 107
» New Results on the Complexity of the Middle Bit of Multiplic...
Sort
View
IEEEPACT
2006
IEEE
14 years 3 months ago
Two-level mapping based cache index selection for packet forwarding engines
Packet forwarding is a memory-intensive application requiring multiple accesses through a trie structure. The efficiency of a cache for this application critically depends on the ...
Kaushik Rajan, Ramaswamy Govindarajan
IMC
2007
ACM
13 years 10 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
EUROS
2008
177views Robotics» more  EUROS 2008»
13 years 10 months ago
Eyes-Neck Coordination Using Chaos
Abstract. The increasing complexity of humanoid robots and their expected performance in real dynamic environments demand an equally complex, autonomous and dynamic solution. Our a...
Boris Duran, Yasuo Kuniyoshi, Giulio Sandini
ICCV
2011
IEEE
12 years 9 months ago
Decision Tree Fields
This paper introduces a new formulation for discrete image labeling tasks, the Decision Tree Field (DTF), that combines and generalizes random forests and conditional random fiel...
Sebastian Nowozin, Carsten Rother, Shai Bagon, Ban...
EDBT
2010
ACM
177views Database» more  EDBT 2010»
13 years 11 months ago
PerK: personalized keyword search in relational databases through preferences
Keyword-based search in relational databases allows users to discover relevant information without knowing the database schema or using complicated queries. However, such searches...
Kostas Stefanidis, Marina Drosou, Evaggelia Pitour...