Sciweavers

1207 search results - page 54 / 242
» Towards optimal k-anonymization
Sort
View
CCIA
2009
Springer
14 years 7 days ago
Secure and Optimal Base Contraction in Graded Lukasiewicz Logics
Abstract. The operation of base contraction was successfully characterized for a very general class of logics using the notion of remainder sets. Although, in the general case, thi...
Pere Pardo, Pilar Dellunde, Lluis Godo
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 11 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
ICCAD
2006
IEEE
124views Hardware» more  ICCAD 2006»
14 years 8 months ago
Combinatorial algorithms for fast clock mesh optimization
We present a fast and efficient combinatorial algorithm to simultaneously identify the candidate locations as well as the sizes of the buffers driving a clock mesh. Due to the hi...
Ganesh Venkataraman, Zhuo Feng, Jiang Hu, Peng Li
ICRA
2008
IEEE
197views Robotics» more  ICRA 2008»
14 years 5 months ago
A Bayesian framework for optimal motion planning with uncertainty
— Modeling robot motion planning with uncertainty in a Bayesian framework leads to a computationally intractable stochastic control problem. We seek hypotheses that can justify a...
Andrea Censi, Daniele Calisi, Alessandro De Luca, ...
ICCAD
1997
IEEE
134views Hardware» more  ICCAD 1997»
14 years 3 months ago
Post-route optimization for improved yield using a rubber-band wiring model
This paper presents a unique approach to improve yield given a routed layout. Currently after routing has been completed and compacted, it generally proceeds to verification witho...
Jeffrey Z. Su, Wayne Wei-Ming Dai