Sciweavers

995 search results - page 79 / 199
» Wire-speed total order
Sort
View
FUZZIEEE
2007
IEEE
14 years 21 days ago
The Parametric Modification of Fuzzy Sets Constituting a Content of Medical Linguistic Variables
One of the most important features of fuzzy set theory is its potential for the modeling of natural language expressions. Most works done on this topic focus on some parts of natur...
Elisabeth Rakus-Andersson
DATE
2004
IEEE
147views Hardware» more  DATE 2004»
14 years 16 days ago
Automatic Tuning of Two-Level Caches to Embedded Applications
The power consumed by the memory hierarchy of a microprocessor can contribute to as much as 50% of the total microprocessor system power, and is thus a good candidate for optimiza...
Ann Gordon-Ross, Frank Vahid, Nikil Dutt
CAV
2006
Springer
146views Hardware» more  CAV 2006»
14 years 16 days ago
Termination Analysis with Calling Context Graphs
We introduce calling context graphs and various static and theorem proving based analyses that together provide a powerful method for proving termination of programs written in fea...
Panagiotis Manolios, Daron Vroon
EUROMICRO
2004
IEEE
14 years 16 days ago
CoBFIT: A Component-Based Framework for Intrusion Tolerance
In this paper, we present the architecture of CoBFIT, a component-based framework for building intrusion-tolerant distributed systems. The CoBFIT framework, by virtue of its desig...
HariGovind V. Ramasamy, Adnan Agbaria, William H. ...
EUROCRYPT
2006
Springer
14 years 14 days ago
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users...
Dan Boneh, Amit Sahai, Brent Waters