Sciweavers

225 search results - page 14 / 45
» State Exploration with Multiple State Groupings
Sort
View
TARK
2007
Springer
14 years 1 months ago
Vote manipulation in the presence of multiple sincere ballots
A classical result in voting theory, the Gibbard-Satterthwaite Theorem, states that for any non-dictatorial voting rule for choosing between three or more candidates, there will b...
Ulle Endriss
MM
2010
ACM
151views Multimedia» more  MM 2010»
13 years 7 months ago
Enhanced exploration of oral history archives through processed video and synchronized text transcripts
A digital video library of over 900 hours of video and 18000 stories from The HistoryMakers was used by 266 students, faculty, librarians, and life-long learners interacting with ...
Michael G. Christel, Scott M. Stevens, Bryan Maher...
ICLP
2009
Springer
14 years 8 months ago
A Tabling Implementation Based on Variables with Multiple Bindings
Suspension-based tabling systems have to save and restore computation states belonging to OR branches. Stack freezing combined with (forward) trailing is among the better-known imp...
Pablo Chico de Guzmán, Manuel Carro, Manuel...
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
14 years 1 months ago
Towards an optimised VLSI design algorithm for the constant matrix multiplication problem
The efficient design of multiplierless implementa- The goal is to find the optimal sub-expressions across all N dot tions of constant matrix multipliers is challenged by the huge p...
Andrew Kinane, Valentin Muresan, Noel E. O'Connor
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...