Sciweavers

2168 search results - page 33 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
PDPTA
2000
13 years 9 months ago
On Using the UML to Describe the MASC Model of Parallel Computation
- A Unified Modeling Language (UML) description of the MASC model of parallel computation is presented. This UML description identifies MASC objects and specifies various object an...
Michael Scherger, Johnnie Potter, Jerry W. Baker
DICS
2006
13 years 9 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
TVCG
2008
125views more  TVCG 2008»
13 years 7 months ago
Generic Remeshing of 3D Triangular Meshes with Metric-Dependent Discrete Voronoi Diagrams
In this paper, we propose a generic framework for 3D surface remeshing. Based on a metric-driven Discrete Voronoi Diagram construction, our output is an optimized 3D triangular mes...
Sébastien Valette, Jean-Marc Chassery, R&ea...
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
DAC
1999
ACM
14 years 21 hour ago
Leakage Control with Efficient Use of Transistor Stacks in Single Threshold CMOS
The state dependence of leakage can be exploited to obtain modest leakage savings in CMOS circuits. However, one can modify circuits considering state dependence and achieve large...
Mark C. Johnson, Dinesh Somasekhar, Kaushik Roy