Sciweavers

203 search results - page 33 / 41
» Reconfigurable Sequential Consistency Algorithm
Sort
View
TC
2008
13 years 7 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
14 years 1 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
WWW
2002
ACM
14 years 8 months ago
A probabilistic approach to automated bidding in alternative auctions
This paper presents an approach to develop bidding agents that participate in multiple alternative auctions, with the goal of obtaining an item at the lowest price. The approach c...
Marlon Dumas, Lachlan Aldred, Guido Governatori, A...
DCC
2000
IEEE
14 years 1 days ago
Trees, Windows, and Tiles for Wavelet Image Compression
We investigate the task of compressing an image by using different probability models for compressing different regions of the image. In an earlier paper, we introduced a class of...
Wee Sun Lee
TEC
2002
119views more  TEC 2002»
13 years 7 months ago
Graph-based evolutionary design of arithmetic circuits
Abstract--In this paper, we present an efficient graph-based evolutionary optimization technique called evolutionary graph generation (EGG) and the proposed approach is applied to ...
Dingjun Chen, Takafumi Aoki, Naofumi Homma, Toshik...