Sciweavers

1448 search results - page 12 / 290
» From Requirements to Code Revisited
Sort
View
IH
2007
Springer
14 years 1 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
CIKM
2008
Springer
13 years 9 months ago
Topic models and a revisit of text-related applications
Topic models such as aspect model or LDA have been shown as a promising approach for text modeling. Unlike many previous models that restrict each document to a single topic, topi...
Viet Ha-Thuc, Padmini Srinivasan
SAC
2010
ACM
14 years 2 months ago
Performance analysis of FlexRay-based systems using real-time calculus, revisited
The FlexRay protocol [4] is likely to be the de facto standard for automotive communication systems. Hence, there is a need to provide hard performance guarantees on properties li...
Devesh B. Chokshi, Purandar Bhaduri
ISCA
2007
IEEE
130views Hardware» more  ISCA 2007»
13 years 7 months ago
Non-Inclusion Property in Multi-Level Caches Revisited
The center of gravity of computer architecture is moving toward memory systems. Barring breakthrough microarchitectural techniques to move processor performance to higher levels, ...
Mohamed M. Zahran, Kursad Albayraktaroglu, Manoj F...
ICS
1995
Tsinghua U.
13 years 11 months ago
Optimum Modulo Schedules for Minimum Register Requirements
Modulo scheduling is an e cient technique for exploiting instruction level parallelism in a variety of loops, resulting in high performance code but increased register requirement...
Alexandre E. Eichenberger, Edward S. Davidson, San...