Sciweavers

2357 search results - page 370 / 472
» Computing Refactorings of Behavior Models
Sort
View
221
Voted
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
16 years 3 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
DAC
2004
ACM
16 years 3 months ago
High level cache simulation for heterogeneous multiprocessors
As multiprocessor systems-on-chip become a reality, performance modeling becomes a challenge. To quickly evaluate many architectures, some type of high-level simulation is require...
Joshua J. Pieper, Alain Mellan, JoAnn M. Paul, Don...
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
16 years 2 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
126
Voted
DATE
2008
IEEE
111views Hardware» more  DATE 2008»
15 years 9 months ago
A Formal Approach To The Protocol Converter Problem
In the absence of a single module interface standard, integration of pre-designed modules in System-on-Chip design often requires the use of protocol converters. Existing approach...
Karin Avnit, Vijay D'Silva, Arcot Sowmya, S. Rames...
124
Voted
IJCNN
2008
IEEE
15 years 9 months ago
Adaptation of barn owl localization system with spike timing dependent plasticity
— To localize a seen object, the superior colliculus of the barn owl integrates the visual and auditory localization cues which are accessed from the sensory system of the brain....
Juan Huo, Alan F. Murray, Leslie Smith, Zhijun Yan...