Sciweavers

7519 search results - page 1469 / 1504
» Optimizing Generic Functions
Sort
View
CRYPTO
2006
Springer
111views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
We address the message authentication problem in two seemingly different communication models. In the first model, the sender and receiver are connected by an insecure channel and...
Moni Naor, Gil Segev, Adam Smith
INFOCOM
2000
IEEE
14 years 1 months ago
A Predictability Analysis of Network Traffic
This paper assesses the predictability of network traffic by considering two metrics: (1) how far into the future a traffic rate process can be predicted with bounded error; (2) w...
Aimin Sang, San-qi Li
MICCAI
2000
Springer
14 years 1 months ago
Fixation-Based Surgery: A New Technique for Distal Radius Osteotomy
Abstract. Fixation-based surgery is a new technique for achieving difficult corrections in some orthopedic procedures. The method is premised on using a fixation device, such as a ...
H. Croitoru, Randy E. Ellis, Carolyn F. Small, Dav...
COLT
1995
Springer
14 years 1 months ago
Regression NSS: An Alternative to Cross Validation
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
Michael P. Perrone, Brian S. Blais
ICCAD
1995
IEEE
135views Hardware» more  ICCAD 1995»
14 years 1 months ago
An iterative improvement algorithm for low power data path synthesis
We address the problem of minimizing power consumption in behavioral synthesis of data-dominated circuits. The complex nature of power as a cost function implies that the effects ...
Anand Raghunathan, Niraj K. Jha
« Prev « First page 1469 / 1504 Last » Next »