Sciweavers

492 search results - page 40 / 99
» The number of possibilities for random dating
Sort
View
ISCA
2008
IEEE
92views Hardware» more  ISCA 2008»
14 years 3 months ago
Counting Dependence Predictors
Modern processors rely on memory dependence prediction to execute load instructions as early as possible, speculating that they are not dependent on an earlier, unissued store. To...
Franziska Roesner, Doug Burger, Stephen W. Keckler
RTSS
2007
IEEE
14 years 2 months ago
Composing Functional and State-Based Performance Models for Analyzing Heterogeneous Real-Time Systems
— We present a performance analysis technique for distributed real-time systems in a setting where certain components are modeled in a purely functional manner, while the remainin...
Linh T. X. Phan, Samarjit Chakraborty, P. S. Thiag...
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
14 years 2 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
EMMCVPR
2001
Springer
14 years 1 months ago
An Experimental Comparison of Min-cut/Max-flow Algorithms for Energy Minimization in Vision
After [15, 31, 19, 8, 25, 5] minimum cut/maximum flow algorithms on graphs emerged as an increasingly useful tool for exact or approximate energy minimization in low-level vision...
Yuri Boykov, Vladimir Kolmogorov
WCNC
2010
IEEE
14 years 16 days ago
Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs
—The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the...
Ioannis Broustis, Konstantinos Pelechrinis, Dimitr...