Sciweavers

287 search results - page 30 / 58
» On the Power of Randomization in Algorithmic Mechanism Desig...
Sort
View
EELC
2006
154views Languages» more  EELC 2006»
14 years 2 months ago
Unify and Merge in Fluid Construction Grammar
Research into the evolution of grammar requires that we employ formalisms and processing mechanisms that are powerful enough to handle features found in human natural languages. Bu...
Luc Steels, Joachim De Beule
MOBIHOC
2006
ACM
14 years 10 months ago
Proportionally fair allocation of end-to-end bandwidth in STDMA wireless networks
We consider the problem of designing distributed mechanisms for joint congestion control and resource allocation in spatial-reuse TDMA wireless networks. The design problem is pos...
Pablo Soldati, Björn Johansson, Mikael Johans...
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 5 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
ICDCSW
2002
IEEE
14 years 3 months ago
Subscription Summaries for Scalability and Efficiency in Publish/Subscribe Systems
A key issue when designing and implementing largescale publish/subscribe systems is how to efficiently propagate subscriptions among the brokers of the system. Brokers require thi...
Peter Triantafillou, Andreas A. Economides
ICCAD
2009
IEEE
131views Hardware» more  ICCAD 2009»
13 years 8 months ago
Scheduling with soft constraints
In a behavioral synthesis system, a typical approach used to guide the scheduler is to impose hard constraints on the relative timing between operations considering performance, a...
Jason Cong, Bin Liu, Zhiru Zhang