Sciweavers

1156 search results - page 202 / 232
» Compositional Methods for Information-Hiding
Sort
View
TCAD
1998
127views more  TCAD 1998»
13 years 7 months ago
Gate-level power estimation using tagged probabilistic simulation
In this paper, we present a probabilistic simulation technique to estimate the power consumption of a cmos circuit under a general delay model. This technique is based on the noti...
Chih-Shun Ding, Chi-Ying Tsui, Massoud Pedram
TCSV
2002
78views more  TCSV 2002»
13 years 7 months ago
Local bandwidth constrained fast inverse motion compensation for DCT-domain video transcoding
DCT-based digital video coding standards such as MPEG and H.26x are becoming more widely adopted for multimedia applications. Since the standards differ in their format and syntax...
Shizhong Liu, Alan C. Bovik
CGF
2008
184views more  CGF 2008»
13 years 7 months ago
GPU Accelerated Direct Volume Rendering on an Interactive Light Field Display
We present a GPU accelerated volume ray casting system interactively driving a multi-user light field display. The display, driven by a single programmable GPU, is based on a spec...
Marco Agus, Enrico Gobbetti, José Antonio I...
IEEEHPCS
2010
13 years 6 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
JCS
2010
112views more  JCS 2010»
13 years 6 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...