Sciweavers

1358 search results - page 92 / 272
» Proceedings
Sort
View
113
Voted
ICCAD
2006
IEEE
125views Hardware» more  ICCAD 2006»
15 years 11 months ago
Leveraging protocol knowledge in slack matching
Stalls, due to mis-matches in communication rates, are a major performance obstacle in pipelined circuits. If the rate of data production is faster than the rate of consumption, t...
Girish Venkataramani, Seth Copen Goldstein
105
Voted
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
15 years 11 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
234
Voted

Source Code
1894views
15 years 9 months ago
Supervised Image Segmentation Using Markov Random Fields
This is the sample implementation of a Markov random field based image segmentation algorithm described in the following papers: 1. Mark Berthod, Zoltan Kato, Shan Yu, and Josi...
Csaba Gradwohl, Zoltan Kato
114
Voted
SAC
2010
ACM
15 years 9 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
93
Voted
IAT
2009
IEEE
15 years 9 months ago
Evaluating a Drama Management Approach in an Interactive Fiction Game
— In this paper, we evaluate a drama management approach deployed in an implementation of a graphical interactive fiction game. Our approach uses players’ feedback as a basis f...
Andrea Corradini, Manish Mehta, Santi Ontañ...