Sciweavers

370 search results - page 22 / 74
» Bounded modified realizability
Sort
View
EUROCRYPT
2006
Springer
14 years 8 days ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...
CEC
2008
IEEE
14 years 3 months ago
A contour method in population-based stochastic algorithms
—Inspired by the contours in topography, this paper proposes a contour method for the population-based stochastic algorithms to solve the problems with continuous variables. Rely...
Ying Lin, Jun Zhang, Lu-kai Lan
AWCC
2004
Springer
14 years 2 months ago
An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective
Abstract. This paper proposes an approach to dynamically reconfiguring service-oriented applications from a business perspective: CAFISEadapt, which defines both business-level and...
Jianwu Wang, Yanbo Han, Jing Wang 0002, Gang Li
IJCNLP
2004
Springer
14 years 1 months ago
Improving Noun Phrase Coreference Resolution by Matching Strings
In this paper we present a noun phrase coreference resolution system which aims to enhance the identification of the coreference realized by string matching. For this purpose, we ...
Xiaofeng Yang, Guodong Zhou, Jian Su, Chew Lim Tan
ISCAS
2003
IEEE
169views Hardware» more  ISCAS 2003»
14 years 1 months ago
Efficient implementation of complex exponentially-modulated filter banks
In Exponentially-ModulatedFilter Bank (EMFB) the complex subfilters are generated from a real-valued prototype filter by multiplying the filter impulse response with complex expon...
Juuso Alhava, Ari Viholainen, Markku Renfors