Sciweavers

384 search results - page 74 / 77
» The Number of Generalized Balanced Lines
Sort
View
FOCS
2006
IEEE
14 years 1 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...
IWPSE
2005
IEEE
14 years 28 days ago
Evolution and Growth in Large Libre Software Projects
Software evolution research has recently focused on new development paradigms, studying whether laws found in more classic development environments also apply. Previous works have...
Gregorio Robles, Juan José Amor, Jesú...
TPHOL
2005
IEEE
14 years 28 days ago
A HOL Theory of Euclidean Space
We describe a formalization of the elementary algebra, topology and analysis of finite-dimensional Euclidean space in the HOL Light theorem prover. (Euclidean space is RN with the...
John Harrison
ISLPED
2005
ACM
102views Hardware» more  ISLPED 2005»
14 years 27 days ago
Snug set-associative caches: reducing leakage power while improving performance
As transistors keep shrinking and on-chip data caches keep growing, static power dissipation due to leakage of caches takes an increasing fraction of total power in processors. Se...
Jia-Jhe Li, Yuan-Shin Hwang
COCO
2005
Springer
150views Algorithms» more  COCO 2005»
14 years 26 days ago
The Quantum Adversary Method and Classical Formula Size Lower Bounds
We introduce two new complexity measures for Boolean functions, which we name sumPI and maxPI. The quantity sumPI has been emerging through a line of research on quantum query com...
Sophie Laplante, Troy Lee, Mario Szegedy