Sciweavers

644 search results - page 54 / 129
» An Exploration of Random Processes for Engineers
Sort
View
FOSSACS
2008
Springer
13 years 9 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
ICASSP
2011
IEEE
12 years 11 months ago
Exploiting an interplay between norms to analyze scalar quantization schemes
Quantization is intrinsic to several data acquisition systems. This process is especially important in distributed settings, where observations must rst be compressed before they ...
Parimal Parag, Jean-François Chamberland
ISPW
2008
IEEE
14 years 2 months ago
Accurate Estimates without Calibration?
Most process models calibrate their internal settings using historical data. Collecting this data is expensive, tedious, and often an incomplete process. Is it possible to make acc...
Tim Menzies, Oussama El-Rawas, Barry W. Boehm, Ray...
TSE
2010
132views more  TSE 2010»
13 years 2 months ago
ASCENT: An Algorithmic Technique for Designing Hardware and Software in Tandem
Search-based software engineering is an emerging paradigm that uses automated search algorithms to help designers iteratively find solutions to complicated design problems. For exa...
Jules White, Brian Doughtery, Douglas C. Schmidt
WER
1999
Springer
14 years 3 days ago
A Knowledge Acquisition Systematic within the Domain Analysis Context
This work presents a systematic approach to knowledge acquisition within the domain analysis context, which grants a well defined process for eliciting and representing domain info...
Mônica Zopelari Roseti, Cláudia Maria...