Sciweavers

631 search results - page 103 / 127
» Deriving Specifications from Requirements: An Example
Sort
View
MICRO
2010
IEEE
172views Hardware» more  MICRO 2010»
13 years 5 months ago
Architectural Support for Fair Reader-Writer Locking
Abstract--Many shared-memory parallel systems use lockbased synchronization mechanisms to provide mutual exclusion or reader-writer access to memory locations. Software locks are i...
Enrique Vallejo, Ramón Beivide, Adriá...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 7 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
CVPR
2007
IEEE
14 years 9 months ago
What makes a good model of natural images?
Many low-level vision algorithms assume a prior probability over images, and there has been great interest in trying to learn this prior from examples. Since images are very non G...
Yair Weiss, William T. Freeman
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 9 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
CG
2004
Springer
13 years 7 months ago
Multi-channel publishing of interactive multimedia presentations
The ongoing convergence between TV and the Internet leads traditional broadcast companies to publish their content on the Internet. Interactive digital TV platforms, which support...
Steven Van Assche, Filip Hendrickx, Nico Oorts, Lo...