Sciweavers

36320 search results - page 7 / 7264
» From Code to Models
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 9 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
CORR
2010
Springer
53views Education» more  CORR 2010»
13 years 7 months ago
Prequential Plug-In Codes that Achieve Optimal Redundancy Rates even if the Model is Wrong
We analyse the prequential plug-in codes relative to one-parameter exponential families M. We show that if data are sampled i.i.d. from some distribution outside M, then the redund...
Peter Grünwald, Wojciech Kotlowski
BMCBI
2011
13 years 2 months ago
Simulated evolution applied to study the genetic code optimality using a model of codon reassignments
Background: As the canonical code is not universal, different theories about its origin and organization have appeared. The optimization or level of adaptation of the canonical ge...
Jose Santos, Ángel Monteagudo
CLEIEJ
2002
192views more  CLEIEJ 2002»
13 years 7 months ago
Automatic ObjectPascal Code Generation from Catalysis Specifications
This paper presents a Component-based Framework Development Process, of the Cardiology Domain. The Framework, called FrameCardio, was developed in 4 steps: 1Problem Domain Definit...
João Luís Cardoso de Moraes, Ant&oci...
ESTIMEDIA
2007
Springer
14 years 1 months ago
Data-Parallel Code Generation from Synchronous Dataflow Specification of Multimedia Applications
Embedded software design for MPSoC needs parallel programming. Popular programming languages such as C and C++ are not adequate for initial specification since they are designed f...
Seongnam Kwon, Choonseung Lee, Soonhoi Ha