Sciweavers

7200 search results - page 1361 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
EUROSYS
2009
ACM
14 years 5 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle usersā€™ conļ¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
EUROSYS
2007
ACM
14 years 5 months ago
Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors
The major chip manufacturers have all introduced chip multiprocessing (CMP) and simultaneous multithreading (SMT) technology into their processing units. As a result, even low-end...
David K. Tam, Reza Azimi, Michael Stumm
ICCAD
2006
IEEE
127views Hardware» more  ICCAD 2006»
14 years 5 months ago
Joint design-time and post-silicon minimization of parametric yield loss using adjustable robust optimization
Parametric yield loss due to variability can be effectively reduced by both design-time optimization strategies and by adjusting circuit parameters to the realizations of variable...
Murari Mani, Ashish Kumar Singh, Michael Orshansky
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
14 years 5 months ago
Performance-oriented statistical parameter reduction of parameterized systems via reduced rank regression
Process variations in modern VLSI technologies are growing in both magnitude and dimensionality. To assess performance variability, complex simulation and performance models param...
Zhuo Feng, Peng Li
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 5 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insuļ¬ƒcient due to ā€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
« Prev « First page 1361 / 1440 Last » Next »