Sciweavers

7486 search results - page 62 / 1498
» The Limits of Quantum Computers
Sort
View
ASIACRYPT
2011
Springer
12 years 8 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
DAC
2012
ACM
11 years 11 months ago
Assessing the performance limits of parallelized near-threshold computing
Supply voltage scaling has stagnated in recent technology nodes, leading to so-called “dark silicon.” In this paper, we investigate the limit of voltage scaling together with ...
Nathaniel Ross Pinckney, Korey Sewell, Ronald G. D...
IPL
1998
89views more  IPL 1998»
13 years 8 months ago
A Limitation of Vector Timestamps for Reconstructing Distributed Computations
Vector timestamps provide a way of recording the causal relationships between events in a distributed computation. We draw attention to a limitation of such timestamps when used t...
Colin J. Fidge
VLDB
2003
ACM
141views Database» more  VLDB 2003»
14 years 9 months ago
Computing complete answers to queries in the presence of limited access patterns
In data applications such as information integration, there can be limited access patterns to relations, i.e., binding patterns require values to be specified for certain attribut...
Chen Li
SIGMETRICS
2002
ACM
159views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Limits of wide-area thin-client computing
While many application service providers have proposed using thin-client computing to deliver computational services over the Internet, little work has been done to evaluate the e...
Albert M. Lai, Jason Nieh