Sciweavers

1005 search results - page 152 / 201
» Practical Secure Function Evaluation
Sort
View
DAC
2003
ACM
14 years 11 months ago
Making cyclic circuits acyclic
Cyclic circuits that do not hold state or oscillate are often the most convenient representation for certain functions, such as arbiters, and can easily be produced inadvertently ...
Stephen A. Edwards
FCCM
2007
IEEE
107views VLSI» more  FCCM 2007»
14 years 4 months ago
Optimizing Logarithmic Arithmetic on FPGAs
This paper proposes optimizations of the methods and parameters used in both mathematical approximation and hardware design for logarithmic number system (LNS) arithmetic. First, ...
Haohuan Fu, Oskar Mencer, Wayne Luk
SENSYS
2005
ACM
14 years 3 months ago
Algorithms for generic role assignment in wireless sensor networks
We consider configuration of wireless sensor networks, where certain functions must be automatically assigned to sensor nodes, such that the properties of a sensor node (e.g., rem...
Christian Frank, Kay Römer
ECCV
2010
Springer
14 years 3 months ago
Energy Minimization Under Constraints on Label Counts
Abstract. Many computer vision problems such as object segmentation or reconstruction can be formulated in terms of labeling a set of pixels or voxels. In certain scenarios, we may...
SSDBM
2003
IEEE
137views Database» more  SSDBM 2003»
14 years 3 months ago
Supporting Sliding Window Queries for Continuous Data Streams
Although traditional databases and data warehouses have been exploited widely to manage persistent data, a large number of applications from sensor network need functional support...
Lin Qiao, Divyakant Agrawal, Amr El Abbadi