Sciweavers

5246 search results - page 1005 / 1050
» Sanitization models and their limitations
Sort
View
AC
1998
Springer
14 years 2 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
CHI
1997
ACM
14 years 2 months ago
A Computer Participant in Musical Improvisation
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
William F. Walker
DAC
1997
ACM
14 years 2 months ago
More Practical Bounded-Skew Clock Routing
: Academic clock routing research results has often had limited impact on industry practice, since such practical considerations as hierarchical buffering, rise-time and overshoot ...
Andrew B. Kahng, Chung-Wen Albert Tsao
PODC
1997
ACM
14 years 2 months ago
Dynamic Wavelength Allocation in Optical Networks
This paper proposes algorithms for allocation of wavelengths to connections (lightpaths) in optical wavelength division multiplexed networks, predominantly for ring topologies. Th...
Ornan Ori Gerstel, Galen H. Sasaki, Shay Kutten, R...
STOC
1997
ACM
125views Algorithms» more  STOC 1997»
14 years 2 months ago
An Interruptible Algorithm for Perfect Sampling via Markov Chains
For a large class of examples arising in statistical physics known as attractive spin systems (e.g., the Ising model), one seeks to sample from a probability distribution π on an...
James Allen Fill
« Prev « First page 1005 / 1050 Last » Next »