Sciweavers

2830 search results - page 212 / 566
» No Science without Semantics
Sort
View
COMCOM
1998
81views more  COMCOM 1998»
13 years 9 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh
PRL
1998
152views more  PRL 1998»
13 years 9 months ago
A 3D 6-subiteration thinning algorithm for extracting medial lines
Thinning is a frequently used method for extracting skeletons in discrete spaces. This paper presents an efficient parallel Žthinning algorithm that directly extracts medial line...
Kálmán Palágyi, Attila Kuba
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 7 months ago
Opinion fluctuations and disagreement in social networks
ic copy available at: http://ssrn.com/abstract=1682187 Massachusetts Institute of Technology Department of Economics Working Paper Series Opinion Fluctuations and Disagreement in S...
Daron Acemoglu, Giacomo Como, Fabio Fagnani, Asuma...
POPL
2009
ACM
14 years 10 months ago
A model of cooperative threads
We develop a model of concurrent imperative programming with threads. We focus on a small imperative language with cooperative threads which execute without interruption until the...
Gordon D. Plotkin, Martín Abadi
ICCAD
2004
IEEE
113views Hardware» more  ICCAD 2004»
14 years 6 months ago
High-level synthesis: an essential ingredient for designing complex ASICs
It is common wisdom that synthesizing hardware from higher-level descriptions than Verilog will incur a performance penalty. The case study here shows that this need not be the ca...
Arvind, Rishiyur S. Nikhil, Daniel L. Rosenband, N...