Sciweavers

1646 search results - page 274 / 330
» Automatic generation of two-party computations
Sort
View
MMM
2008
Springer
217views Multimedia» more  MMM 2008»
14 years 4 months ago
Emotion-Based Music Visualization Using Photos
Music players for personal computers are often featured with music visualization by generating animated patterns according to the music’s low-level features such as loudness and ...
Chin-Han Chen, Ming-Fang Weng, Shyh-Kang Jeng, Yun...
LICS
2007
IEEE
14 years 4 months ago
Static Name Control for FreshML
FreshML extends ML with constructs for declaring and ting abstract syntax trees that involve names and statically scoped binders. It is impure: name generation is an observable si...
François Pottier
RTSS
2007
IEEE
14 years 4 months ago
A UML-Based Design Framework for Time-Triggered Applications
Time-triggered architectures (TTAs) are strong candidate platforms for safety-critical real-time applications. A typical time-triggered architecture is constituted by one or more ...
Kathy Dang Nguyen, P. S. Thiagarajan, Weng-Fai Won...
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
14 years 4 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...
CCS
2007
ACM
14 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia