Sciweavers

305 search results - page 23 / 61
» Symmetric Enumeration Reducibility
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
SODA
2010
ACM
163views Algorithms» more  SODA 2010»
14 years 7 months ago
Geometric optimization and sums of algebraic functions
We present a new optimization technique that yields the first FPTAS for several geometric problems. These problems reduce to optimizing a sum of non-negative, constant description...
Antoine Vigneron
COCOA
2007
Springer
14 years 4 months ago
Fundamental Domains for Integer Programs with Symmetries
We define a fundamental domain for a linear programming relaxation of a combinatorial integer program which is symmetric under a group action. We then describe a straightforward w...
Eric J. Friedman
CAL
2006
13 years 10 months ago
Performance, power efficiency and scalability of asymmetric cluster chip multiprocessors
This paper evaluates asymmetric cluster chip multiprocessor (ACCMP) architectures as a mechanism to achieve the highest performance for a given power budget. ACCMPs execute serial ...
T. Y. Morad, Uri C. Weiser, A. Kolodnyt, Mateo Val...
ICRA
2010
IEEE
87views Robotics» more  ICRA 2010»
13 years 8 months ago
DSAC - Dynamic, Single Actuated Climber: Local stability and bifurcations
— This paper investigates a novel mechanism, called DSAC for Dynamic, Single Actuated Climber, which propels itself upwards by oscillating its leg in a symmetric fashion using a ...
Amir Degani, Howie Choset, Matthew T. Mason