Sciweavers

118 search results - page 10 / 24
» Going Digital
Sort
View
ICCAD
1997
IEEE
94views Hardware» more  ICCAD 1997»
14 years 18 days ago
High-level scheduling model and control synthesis for a broad range of design applications
This paper presents a versatile scheduling model and an efficient control synthesis methodology which enables architectural (high-level) design/synthesis systems to seamlessly su...
Chih-Tung Chen, Kayhan Küçük&cced...
APWEB
2006
Springer
14 years 4 days ago
Named Graphs as a Mechanism for Reasoning About Provenance
Named Graphs is a simple, compatible extension to the RDF syntax that enables statements to be made about RDF graphs. This approach is in contrast to earlier attempts such as RDF r...
E. Rowland Watkins, Denis A. Nicole
BCSHCI
2007
13 years 9 months ago
Creativity support: insights from the practices of digital-atomic artists
The support of human creativity by information and communication technology is an important and interesting area for research. To advance our research in this complex area our app...
R. T. Jim Eales, Dharani Priyahansika Perera
ICML
2010
IEEE
13 years 9 months ago
Efficient Learning with Partially Observed Attributes
We describe and analyze efficient algorithms for learning a linear predictor from examples when the learner can only view a few attributes of each training example. This is the ca...
Nicolò Cesa-Bianchi, Shai Shalev-Shwartz, O...
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 8 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...