Sciweavers

811 search results - page 142 / 163
» When Novelty Is Not Enough
Sort
View
ASIACRYPT
2003
Springer
14 years 1 months ago
Almost Uniform Density of Power Residues and the Provable Security of ESIGN
Abstract. ESIGN is an efficient signature scheme that has been proposed in the early nineties (see [14]). Recently, an effort was made to lay ESIGN on firm foundations, using the...
Tatsuaki Okamoto, Jacques Stern
CF
2010
ACM
14 years 1 months ago
Interval-based models for run-time DVFS orchestration in superscalar processors
We develop two simple interval-based models for dynamic superscalar processors. These models allow us to: i) predict with great accuracy performance and power consumption under va...
Georgios Keramidas, Vasileios Spiliopoulos, Stefan...
3DPVT
2002
IEEE
128views Visualization» more  3DPVT 2002»
14 years 1 months ago
Towards Automatic Modeling of Monuments and Towers
Three-dimensional modeling from images, when carried out entirely by a human, can be time consuming and impractical for large-scale projects. On the other hand, full automation ma...
Sabry F. El-Hakim, J.-Angelo Beraldin, Jean-Fran&c...
IEEEINTERACT
2002
IEEE
14 years 1 months ago
Code Cache Management Schemes for Dynamic Optimizers
A dynamic optimizer is a software-based system that performs code modifications at runtime, and several such systems have been proposed over the past several years. These systems ...
Kim M. Hazelwood, Michael D. Smith
LICS
2002
IEEE
14 years 1 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson