Sciweavers

160 search results - page 14 / 32
» Application of real rational modules in system identificatio...
Sort
View
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 8 months ago
Automatic identification of quasi-experimental designs for discovering causal knowledge
Researchers in the social and behavioral sciences routinely rely on quasi-experimental designs to discover knowledge from large databases. Quasi-experimental designs (QEDs) exploi...
David D. Jensen, Andrew S. Fast, Brian J. Taylor, ...
BLISS
2009
IEEE
13 years 8 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
EUROPKI
2009
Springer
13 years 5 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
DAC
2004
ACM
13 years 11 months ago
An SoC design methodology using FPGAs and embedded microprocessors
In System on Chip (SoC) design, growing design complexity has esigners to start designs at higher abstraction levels. This paper proposes an SoC design methodology that makes full...
Nobuyuki Ohba, Kohji Takano
CW
2008
IEEE
14 years 2 months ago
Interactive Animation of Virtual Characters: Application to Virtual Kung-Fu Fighting
This paper aims at proposing a framework for animating virtual humans that can efficiently interact with real users in virtual reality (VR). If the user’s order can be modeled ...
Nicolas Pronost, Franck Multon, Qilei Li, Weidong ...