Quantum-dot Cellular Automata (QCA) is a novel computing mechanism that can represent binary information based on spatial distribution of electron charge configuration in chemical molecules. It has the potential to al...
详细信息
ISBN:
(纸本)1581138539
Quantum-dot Cellular Automata (QCA) is a novel computing mechanism that can represent binary information based on spatial distribution of electron charge configuration in chemical molecules. It has the potential to allow for circuits and systems with functional densities that are better than end of the roadmap CMOS, but also imposes new constraints on system designers. In this paper we develop the first cell-level placement of QCA circuits, where the given circuit is assumed to be partitioned into 4-phase asynchronous QCA timing zones. We formulate the QCA cell placement in each timing zone as a unidirectional geometric embedding of k-layered bipartite graphs. We then present an analytical and a stochastic solution for minimizing the wire crossings and wire length in these placement solutions.
Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource dis...
详细信息
Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be solved. While resource discovery systems are not a novel concept, securing these systems in an efficient and scalable way is challenging. This paper describes the design and implementation of an architecture for access-controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is scalable, efficient, and fits well within a proxy-based security framework designed for dynamic networks. We provide performance experiments that show how our solution outperforms existing schemes. The result is a system that provides secure, access-controlled resource discovery that can scale to large numbers of resources and users. Copyright (C) 2004 John Wiley Sons, Ltd.
We present a subresultant-based algorithm for deciding if the parametrization of a toric hypersurface is invertible or not, and for computing the inverse of the parametrization in the case where it exists. The algorit...
详细信息
ISBN:
(纸本)9781581138276
We present a subresultant-based algorithm for deciding if the parametrization of a toric hypersurface is invertible or not, and for computing the inverse of the parametrization in the case where it exists. The algorithm takes into account the monomial structure of the input polynomials. Copyright 2004acm.
The proceedings contains 31 papers from the proceedings of the Twenty-Third acm SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems. The topics discussed include: conditional XPath, the first order comple...
详细信息
The proceedings contains 31 papers from the proceedings of the Twenty-Third acm SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems. The topics discussed include: conditional XPath, the first order complete XPath dialect;frontiers for tractability for typechecking simple XML transformations;positive active XML;the past, present and future of web information retrieval;comparing and aggregating rankings with ties and specification and verification of data-driven web services.
In 2001, the acm and the IEEE-CS published computing Curricula 2001 which contains curriculum recommendations for undergraduate programs in computer science. That report also called for additional discipline-specific ...
详细信息
ISBN:
(纸本)1581137982
In 2001, the acm and the IEEE-CS published computing Curricula 2001 which contains curriculum recommendations for undergraduate programs in computer science. That report also called for additional discipline-specific volumes for each of computer engineering, information systems, and software engineering. In addition, it called for an Overview Volume to provide a synthesis of the various volumes. The computing Curricula 2004 Task Force has undertaken a two-pronged strategy to fulfill the latter charge. The purpose of this session is to present an overview of the Task Force's work and to generate feedback from the SIGCSE membership to the Task Force about the direction and plans we have undertaken.
Meshless methods are a new class of numerical techniques for solving partial differential equations and have attracted considerable attention in computational mechanics in recent years. Owing to the 'mesh-free'...
详细信息
Meshless methods are a new class of numerical techniques for solving partial differential equations and have attracted considerable attention in computational mechanics in recent years. Owing to the 'mesh-free' characteristic, these methods offer some advantages over the conventional mesh-based finite-element techniques. A formulation for the meshless local Petrov-Galerkin method is described and its application to electromagnetic modelling investigated.
This paper describes an online control framework to design self-managing distributed computing systems that continually optimize their performance in response to changing computing demands and environmental conditions...
详细信息
ISBN:
(纸本)1581139896
This paper describes an online control framework to design self-managing distributed computing systems that continually optimize their performance in response to changing computing demands and environmental conditions. An on-line control technique is used in conjunction with predictive filters to tune the performance of individual system components based on their forecast behavior. In a distributed setting, a global controller is used to manage the interaction between components such that overall system requirements are satisfied.
University education in computer science requires that students learn something of the nature of the discipline. We argue that, in addition to content knowledge, two of the many things the educated computer scientist ...
详细信息
ISBN:
(纸本)1581137982
University education in computer science requires that students learn something of the nature of the discipline. We argue that, in addition to content knowledge, two of the many things the educated computer scientist might know about are the computer science pantheon and the metaphorical structure of the discipline's technical language. Copyright 2004acm.
The computer engineering and software engineering volumes of the IEEE-CS/acmcomputing Cirricula are presented. The computer engineering includes science and technology of design, construction, implementation and main...
详细信息
ISBN:
(纸本)1581137982
The computer engineering and software engineering volumes of the IEEE-CS/acmcomputing Cirricula are presented. The computer engineering includes science and technology of design, construction, implementation and maintenance of hardware and software components. The computer engineering supports underlying principles of professionalism which fosters computer ethics, best practices and professional conduct. The software engineering curriculum focus on undergraduate software engineering education knowledge.
暂无评论