Sciweavers

600 search results - page 52 / 120
» Problems and results in extremal combinatorics - II
Sort
View
HOTOS
1999
IEEE
14 years 1 months ago
The Case for Informed Transport Protocols
Wide-area distributed applications are frequently limited by the performance of Internet data transfer. We argue that the principle cause of this effect is the poor interaction be...
Stefan Savage, Neal Cardwell, Thomas E. Anderson
EUROCRYPT
1998
Springer
14 years 1 months ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
ITC
1997
IEEE
92views Hardware» more  ITC 1997»
14 years 1 months ago
A Novel Functional Test Generation Method for Processors Using Commercial ATPG
As the sizes of general and special purpose processors increase rapidly, generating high quality manufacturing tests for them is becoming a serious problem in industry. This paper...
Raghuram S. Tupuri, Jacob A. Abraham
ICIP
1994
IEEE
14 years 1 months ago
Very High Speed Entropy Coding
Efforts to build high-speed hardware for many different entropy coders are limited by fundamental feedback loops. Here is a method that allows for parallel compression in hardware...
Martin P. Boliek, James D. Allen, Edward L. Schwar...
PAKDD
2010
ACM
275views Data Mining» more  PAKDD 2010»
14 years 1 months ago
Anonymizing Transaction Data by Integrating Suppression and Generalization
Abstract. Privacy protection in publishing transaction data is an important problem. A key feature of transaction data is the extreme sparsity, which renders any single technique i...
Junqiang Liu, Ke Wang