Sciweavers

1021 search results - page 132 / 205
» Concepts in Proof Planning
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor
UIST
2009
ACM
14 years 3 months ago
Abracadabra: wireless, high-precision, and unpowered finger input for very small mobile devices
We present Abracadabra, a magnetically driven input technique that offers users wireless, unpowered, high fidelity finger input for mobile devices with very small screens. By exte...
Chris Harrison, Scott E. Hudson
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
14 years 3 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta
APSEC
2008
IEEE
14 years 3 months ago
Test Case Prioritization Based on Analysis of Program Structure
Test case prioritization techniques have been empirically proved to be effective in improving the rate of fault detection in regression testing. However, most of previous techniqu...
Zengkai Ma, Jianjun Zhao
GLOBECOM
2008
IEEE
14 years 3 months ago
Dynamic Path Reconfiguration Among Hybrid FSO/RF Nodes
— To increase the availability of Free Space Network (FSO) networks, the optical link is provided with a redundant backup network, such as RF, to form a hybrid network. The immed...
Swapna Gurumani, Hassan Moradi, Hazem H. Refai, Pe...