Sciweavers

1908 search results - page 349 / 382
» How to teach software modeling
Sort
View
117
Voted
IWSEC
2007
Springer
15 years 10 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
116
Voted
UM
2007
Springer
15 years 10 months ago
Respecting Users' Individual Privacy Constraints in Web Personalization
Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personaliz...
Yang Wang 0005, Alfred Kobsa
163
Voted
RSP
2006
IEEE
120views Control Systems» more  RSP 2006»
15 years 9 months ago
A Case Study of Design Space Exploration for Embedded Multimedia Applications on SoCs
Embedded real-time multimedia applications usually imply data parallel processing. SIMD processors embedded in SOCs are cost-effective to exploit the underlying parallelism. Howev...
Isabelle Hurbain, Corinne Ancourt, François...
110
Voted
SMI
2006
IEEE
112views Image Analysis» more  SMI 2006»
15 years 9 months ago
ReMESH: An Interactive Environment to Edit and Repair Triangle Meshes
Polygonal meshes obtained from acquisition of real-world objects may easily exhibit topological or geometrical defects, which often prevent subsequent processing and analysis to p...
Marco Attene, Bianca Falcidieno
155
Voted
ISSTA
2006
ACM
15 years 9 months ago
Improving distributed memory applications testing by message perturbation
We present initial work on perturbation techniques that cause the manifestation of timing-related bugs in distributed memory Message Passing Interface (MPI)-based applications. Th...
Richard W. Vuduc, Martin Schulz, Daniel J. Quinlan...