Sciweavers

2340 search results - page 440 / 468
» Second quarter 2008
Sort
View
VTS
2008
IEEE
78views Hardware» more  VTS 2008»
14 years 3 months ago
Expanding Trace Buffer Observation Window for In-System Silicon Debug through Selective Capture
Trace buffers are commonly used to capture data during in-system silicon debug. This paper exploits the fact that it is not necessary to capture error-free data in the trace buffe...
Joon-Sung Yang, Nur A. Touba
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 3 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
14 years 3 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
CEC
2009
IEEE
14 years 1 months ago
Memetic algorithm with Local search chaining for large scale continuous optimization problems
Abstract— Memetic algorithms arise as very effective algorithms to obtain reliable and high accurate solutions for complex continuous optimization problems. Nowadays, high dimens...
Daniel Molina, Manuel Lozano, Francisco Herrera
COCO
2010
Springer
129views Algorithms» more  COCO 2010»
14 years 29 days ago
On the Relative Strength of Pebbling and Resolution
The last decade has seen a revival of interest in pebble games in the context of proof complexity. Pebbling has proven to be a useful tool for studying resolution-based proof syst...
Jakob Nordström