Sciweavers

790 search results - page 54 / 158
» Designated Confirmer Signatures
Sort
View
EUROCRYPT
2004
Springer
14 years 22 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
ISLPED
2004
ACM
107views Hardware» more  ISLPED 2004»
14 years 2 months ago
Characterizing and modeling minimum energy operation for subthreshold circuits
Subthreshold operation is emerging as an energy-saving approach to many new applications. This paper examines energy minimization for circuits operating in the subthreshold region...
Benton H. Calhoun, Anantha Chandrakasan
IDEAL
2003
Springer
14 years 2 months ago
A Two-Stage Bayesian Network for Effective Development of Conversational Agent
Conversational agent is a system that provides user with proper information and maintains the context of dialogue based on natural language. When experts design the network for con...
Jin-Hyuk Hong, Sung-Bae Cho
RE
2008
Springer
13 years 8 months ago
Design Science, Engineering Science and Requirements Engineering
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research ...
Roel Wieringa, J. M. G. Heerkens
ISCA
2011
IEEE
313views Hardware» more  ISCA 2011»
13 years 21 days ago
FabScalar: composing synthesizable RTL designs of arbitrary cores within a canonical superscalar template
A growing body of work has compiled a strong case for the single-ISA heterogeneous multi-core paradigm. A single-ISA heterogeneous multi-core provides multiple, differently-design...
Niket Kumar Choudhary, Salil V. Wadhavkar, Tanmay ...