Sciweavers

124 search results - page 8 / 25
» Using Metaprogramming to Parallelize Functional Specificatio...
Sort
View
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
DAC
2002
ACM
14 years 10 months ago
Exploiting operation level parallelism through dynamically reconfigurable datapaths
Increasing non-recurring engineering (NRE) and mask costs are making it harder to turn to hardwired Application Specific Integrated Circuit (ASIC) solutions for high performance a...
Zhining Huang, Sharad Malik
COLT
2006
Springer
14 years 1 months ago
Online Multitask Learning
We study the problem of online learning of multiple tasks in parallel. On each online round, the algorithm receives an instance and makes a prediction for each one of the parallel ...
Ofer Dekel, Philip M. Long, Yoram Singer
ICFP
2010
ACM
13 years 11 months ago
Regular, shape-polymorphic, parallel arrays in Haskell
We present a novel approach to regular, multi-dimensional arrays in Haskell. The main highlights of our approach are that it (1) is purely functional, (2) supports reuse through s...
Gabriele Keller, Manuel M. T. Chakravarty, Roman L...
IPPS
1999
IEEE
14 years 2 months ago
The Biological Basis of the Immune System as a Model for Intelligent Agents
This paper describes the human immune system and its functionalities from a computational viewpoint. The objective of this paper is to provide the biological basis for an artificia...
Roger L. King, Aric B. Lambert, Samuel H. Russ, Do...