Sciweavers

412 search results - page 35 / 83
» An evaluation of timed scenario notations
Sort
View
FP
1989
124views Formal Methods» more  FP 1989»
14 years 3 months ago
Deriving the Fast Fourier Algorithm by Calculation
This paper reports an explanation of an intricate algorithm in the terms of a potentially mechanisable rigorous-development method. It uses notations and techniques of Sheeran 1] ...
Geraint Jones
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 1 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
SCESM
2006
ACM
247views Algorithms» more  SCESM 2006»
14 years 4 months ago
Automating software architecture exploration with M2Aspects
An important step in the development of large-scale distributed reactive systems is the design of effective system architectures. The early availability of prototypes facilitates...
Ingolf H. Krüger, Gunny Lee, Michael Meisinge...
GRID
2007
Springer
14 years 2 months ago
Optimizing multiple queries on scientific datasets with partial replicas
We propose strategies to efficiently execute a query workload, which consists of multiple related queries submitted against a scientific dataset, on a distributed-memory system in...
Li Weng, Ümit V. Çatalyürek, Tahs...
PERCOM
2007
ACM
14 years 10 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...