Sciweavers

530 search results - page 90 / 106
» Practical Threshold Signatures
Sort
View
ISCA
2010
IEEE
413views Hardware» more  ISCA 2010»
14 years 29 days ago
Resistive computation: avoiding the power wall with low-leakage, STT-MRAM based computing
As CMOS scales beyond the 45nm technology node, leakage concerns are starting to limit microprocessor performance growth. To keep dynamic power constant across process generations...
Xiaochen Guo, Engin Ipek, Tolga Soyata
FUN
2010
Springer
254views Algorithms» more  FUN 2010»
14 years 20 days ago
Christmas Gift Exchange Games
The Christmas gift exchange is a popular party game played around Christmas. Each participant brings a Christmas present to the party, and a random ordering of the participants, ac...
Arpita Ghosh, Mohammad Mahdian
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
14 years 5 days ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang
DAC
1999
ACM
14 years 5 days ago
IC Test Using the Energy Consumption Ratio
Dynamic-current based test techniques can potentially address the drawbacks of traditional and Iddq test methodologies. The quality of dynamic current based test is degraded by pr...
Wanli Jiang, Bapiraju Vinnakota
ACIVS
2009
Springer
13 years 11 months ago
Unsupervised Detection of Gradual Video Shot Changes with Motion-Based False Alarm Removal
The temporal segmentation of a video into shots is a fundamental prerequisite for video retrieval. There are two types of shot boundaries: abrupt shot changes (“cuts”) and grad...
Ralph Ewerth, Bernd Freisleben