Sciweavers

7486 search results - page 104 / 1498
» The Limits of Quantum Computers
Sort
View
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
ICS
1998
Tsinghua U.
14 years 1 months ago
Multipath Execution: Opportunities and Limits
Even sophisticated branch-prediction techniques necessarily suffer some mispredictions, and even relatively small mispredict rates hurt performance substantially in current-genera...
Pritpal S. Ahuja, Kevin Skadron, Margaret Martonos...
ICCAD
1993
IEEE
134views Hardware» more  ICCAD 1993»
14 years 1 months ago
Beyond the combinatorial limit in depth minimization for LUT-based FPGA designs
In this paper, we present an integrated approach to synthesis and mapping to go beyond the combinatorial limit set up by the depth-optimal FlowMap algorithm. The new algorithm, na...
Jason Cong, Yuzheng Ding
WCNC
2010
IEEE
14 years 24 days ago
Distortion Exponents for Multi-Relay Cooperative Networks with Limited Feedback
— In this paper, we consider the transmission of a Gaussian source in a multi-relay cooperative network, where limited channel state feedback is combined with separate source and...
Jing Wang, Jie Liang, Sami Muhaidat
FOCS
2008
IEEE
13 years 9 months ago
Approximation Algorithms for Single-minded Envy-free Profit-maximization Problems with Limited Supply
We present the first polynomial-time approximation algorithms for single-minded envy-free profit-maximization problems [13] with limited supply. Our algorithms return a pricing sc...
Maurice Cheung, Chaitanya Swamy