Sciweavers

886 search results - page 59 / 178
» Generalized Bezout Identity
Sort
View
DIM
2007
ACM
14 years 1 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
DAC
2010
ACM
14 years 1 months ago
Representative path selection for post-silicon timing prediction under variability
The identification of speedpaths is required for post-silicon (PS) timing validation, and it is currently becoming timeconsuming due to manufacturing variations. In this paper we...
Lin Xie, Azadeh Davoodi
FC
2000
Springer
150views Cryptology» more  FC 2000»
14 years 26 days ago
Self-Scrambling Anonymizers
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency...
David Pointcheval
OPODIS
2008
13 years 10 months ago
Rendezvous of Mobile Agents When Tokens Fail Anytime
Abstract. We consider the problem of Rendezvous or gathering of multiple autonomous entities (called mobile agents) moving in an unlabelled environment (modelled as a graph). The p...
Shantanu Das, Matús Mihalák, Rastisl...
CSDA
2007
124views more  CSDA 2007»
13 years 9 months ago
Wavelet based time-varying vector autoregressive modelling
Vector autoregressive (VAR) modelling is one of the most popular approaches in multivariate time series analysis. The parameters interpretation is simple, and provide an intuitive...
João Ricardo Sato, Pedro Alberto Morettin, ...