Sciweavers

1064 search results - page 135 / 213
» Disjoint Systems (Extended Abstract)
Sort
View
141
Voted
TCS
2008
15 years 3 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
128
Voted
VTC
2010
IEEE
165views Communications» more  VTC 2010»
15 years 1 months ago
DVB-S Signal Tracking Techniques for Mobile Phased Arrays
Abstract—A system that uses adaptive beamforming techniques for mobile Digital Video Broadcasting Satellite (DVB-S) reception is proposed in this paper. The purpose is to enable ...
Koen C. H. Blom, Marcel D. van de Burgwal, Kenneth...
111
Voted
TVCG
2011
100views more  TVCG 2011»
14 years 10 months ago
Tugging Graphs Faster: Efficiently Modifying Path-Preserving Hierarchies for Browsing Paths
—Many graph visualization systems use graph hierarchies to organize a large input graph into logical components. These approaches detect features globally in the data and place t...
Daniel Archambault, Tamara Munzner, David Auber
CODES
2006
IEEE
15 years 9 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst
113
Voted
CONCUR
2005
Springer
15 years 9 months ago
SOS for Higher Order Processes
d Abstract) MohammadReza Mousavi1 , Murdoch J. Gabbay2 , and Michel A. Reniers1 1 Department of Computer Science, 2 Department of Computer Science, Eindhoven University of Technolo...
Mohammad Reza Mousavi, Murdoch Gabbay, Michel A. R...