Sciweavers

588 search results - page 84 / 118
» Reducibility and Completeness in Private Computations
Sort
View
LICS
2007
IEEE
14 years 4 months ago
Strong Normalization as Safe Interaction
When enriching the λ-calculus with rewriting, union types may be needed to type all strongly normalizing terms. However, with rewriting, the elimination rule (∨ E) of union typ...
Colin Riba
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
14 years 4 months ago
Equivalence verification of arithmetic datapaths with multiple word-length operands
Abstract: This paper addresses the problem of equivalence verification of RTL descriptions that implement arithmetic computations (add, mult, shift) over bitvectors that have di...
Namrata Shekhar, Priyank Kalla, Florian Enescu
ICMCS
2006
IEEE
134views Multimedia» more  ICMCS 2006»
14 years 3 months ago
A Condition-based Intra Prediction Algorithm for H.264/AVC
This paper proposes a condition-based algorithm for H.264/AVC 4x4 intra prediction. Exploiting high correlation existed in neighboring intra prediction modes, we propose the three...
Jia-Wei Chen, Chun-Hao Chang, Chien-Chang Lin, Yi-...
ICNP
2006
IEEE
14 years 3 months ago
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...
Bin Fan, Dah-Ming Chiu, John C. S. Lui
COLCOM
2005
IEEE
14 years 3 months ago
On-demand overlay networking of collaborative applications
We propose a new overlay network, called Generic Identifier Network (GIN), for collaborative nodes to share objects with transactions across affiliated organizations by merging th...
Cheng-Jia Lai, Richard R. Muntz