Sciweavers

1529 search results - page 177 / 306
» On Timing Analysis of Combinational Circuits
Sort
View
ICCAD
2009
IEEE
161views Hardware» more  ICCAD 2009»
13 years 5 months ago
The epsilon-approximation to discrete VT assignment for leakage power minimization
As VLSI technology reaches 45nm technology node, leakage power optimization has become a major design challenge. Threshold voltage (vt) assignment has been extensively studied, du...
Yujia Feng, Shiyan Hu
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
CMG
2001
13 years 9 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski
ICDAR
2003
IEEE
14 years 1 months ago
Visualizing Multimedia Content on Paper Documents: Components of Key Frame Selection for Video Paper
The components of a key frame selection algorithm for a paper-based multimedia browsing interface called Video Paper are described. Analysis of video image frames is combined with...
Jonathan J. Hull, Berna Erol, Jamey Graham, Dar-Sh...
DSS
2006
91views more  DSS 2006»
13 years 8 months ago
Exploring auction databases through interactive visualization
We introduce AuctionExplorer, a suite of tools for exploring databases of online auctions. The suite combines tools for collecting, processing, and interactively exploring auction...
Galit Shmueli, Wolfgang Jank, Aleks Aris, Catherin...