Sciweavers

906 search results - page 81 / 182
» Role Transfer Problems and Algorithms
Sort
View
132
Voted
SPAA
2004
ACM
15 years 8 months ago
Cache-oblivious shortest paths in graphs using buffer heap
We present the Buffer Heap (BH), a cache-oblivious priority queue that supports Delete-Min, Delete, and Decrease-Key operations in O( 1 B log2 N B ) amortized block transfers fro...
Rezaul Alam Chowdhury, Vijaya Ramachandran
ICDCS
2009
IEEE
15 years 11 months ago
Centaur: A Hybrid Approach for Reliable Policy-Based Routing
In this paper, we consider the design of a policy-based routing system and the role that link state might play. Looking at the problem from a link-state perspective, we propose Ce...
Xin Zhang, Adrian Perrig, Hui Zhang
106
Voted
EUROCRYPT
1999
Springer
15 years 7 months ago
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography
Abstract. This paper addresses the discrete logarithm problem in elliptic curve cryptography. In particular, we generalize the Menezes, Okamoto, and Vanstone (MOV) reduction so tha...
Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hidek...
112
Voted
DAC
2001
ACM
16 years 3 months ago
Coupling-Driven Bus Design for Low-Power Application-Specific Systems
In modern embedded systems including communication and multimedia applications, large fraction of power is consumed during memory access and data transfer. Thus, buses should be d...
Youngsoo Shin, Takayasu Sakurai
130
Voted
EMO
2009
Springer
159views Optimization» more  EMO 2009»
15 years 9 months ago
Recombination for Learning Strategy Parameters in the MO-CMA-ES
The multi-objective covariance matrix adaptation evolution strategy (MO-CMA-ES) is a variable-metric algorithm for real-valued vector optimization. It maintains a parent population...
Thomas Voß, Nikolaus Hansen, Christian Igel