Sciweavers

500 search results - page 8 / 100
» Quantum computing: beyond the limits of conventional computa...
Sort
View
ISCA
2010
IEEE
413views Hardware» more  ISCA 2010»
14 years 17 days ago
Resistive computation: avoiding the power wall with low-leakage, STT-MRAM based computing
As CMOS scales beyond the 45nm technology node, leakage concerns are starting to limit microprocessor performance growth. To keep dynamic power constant across process generations...
Xiaochen Guo, Engin Ipek, Tolga Soyata
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
14 years 7 months ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
CF
2006
ACM
14 years 1 months ago
A dependability perspective on emerging technologies
t available: Pdf (734.64 KB) Additional Information: full citation, abstract, references, index terms Bibliometrics: Downloads (6 Weeks): 25, Downloads (12 Months): 230, Citation C...
Lucian Prodan, Mihai Udrescu, Mircea Vladutiu
DATE
2004
IEEE
131views Hardware» more  DATE 2004»
13 years 11 months ago
Testing of Quantum Dot Cellular Automata Based Designs
There has been considerable research on quantum dots cellular automata as a new computing scheme in the nano-scale regimes. The basic logic element of this technology is a majorit...
Mehdi Baradaran Tahoori, Fabrizio Lombardi