Sciweavers

1045 search results - page 142 / 209
» The Use of Exceptions
Sort
View
APPROX
2008
Springer
100views Algorithms» more  APPROX 2008»
13 years 10 months ago
Optimal Random Matchings on Trees and Applications
In this paper we will consider tight upper- and lower-bounds on the weight of the optimal matching for random point sets distributed among the leaves of a tree, as a function of it...
Jeff Abrahamson, Béla Csaba, Ali Shokoufand...
CEC
2008
IEEE
13 years 10 months ago
Efficient evolution of ART neural networks
Abstract-- Genetic algorithms have been used to evolve several neural network architectures. In a previous effort, we introduced the evolution of three well known ART architects; F...
Assem Kaylani, Michael Georgiopoulos, Mansooreh Mo...
CONEXT
2008
ACM
13 years 10 months ago
Cabernet: connectivity architecture for better network services
Deploying and managing wide-area network services is exceptionally challenging. Despite having servers at many locations, a service provider must rely on an underlying besteffort ...
Yaping Zhu, Rui Zhang-Shen, Sampath Rangarajan, Je...
DSD
2008
IEEE
147views Hardware» more  DSD 2008»
13 years 10 months ago
A Low-Cost Cache Coherence Verification Method for Snooping Systems
Due to modern technology trends such as decreasing feature sizes and lower voltage levels, fault tolerance is becoming increasingly important in computing systems. Shared memory i...
Demid Borodin, Ben H. H. Juurlink
EUROCRYPT
2008
Springer
13 years 10 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...