Sciweavers

3883 search results - page 175 / 777
» Design mentoring based on design evolution analysis
Sort
View
JOC
2011
104views more  JOC 2011»
13 years 3 days ago
Short Undeniable Signatures Based on Group Homomorphisms
This paper is devoted to the design and analysis of short undeniable signatures based on a random oracle. Exploiting their online property, we can achieve signatures with a fully s...
Jean Monnerat, Serge Vaudenay
DAC
2006
ACM
14 years 10 months ago
Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies
The increasing use of Multiprocessor Systems-on-Chip (MPSoCs) for high performance demands of embedded applications results in high power dissipation. The memory subsystem is a la...
Ilya Issenin, Erik Brockmeyer, Bart Durinck, Nikil...
ATAL
2004
Springer
14 years 2 months ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
VIS
2006
IEEE
117views Visualization» more  VIS 2006»
14 years 10 months ago
Transfer Function Fusing
Based on the observation that it is relatively easier for users to generate several good transfer functions (TFs) for different features of volumetric data, we propose TF fusing, ...
Yingcai Wu, Huamin Qu, Hong Zhou, Ming-Yuen Cha...
ETFA
2008
IEEE
14 years 3 months ago
Component based colored Petri net model for Ethernet based networked control systems
This paper presents a novel colored Petri net model for the simulation of fully-switched Ethernet based networked control systems (NCS). The model of the NCS is built from models ...
Abouelabbas Ghanaim, Georg Frey