Sciweavers

576 search results - page 10 / 116
» Improving Offensive Performance Through Opponent Modeling
Sort
View
JSS
2008
113views more  JSS 2008»
13 years 7 months ago
A model for software rework reduction through a combination of anomaly metrics
Analysis of anomalies reported during testing of a project can tell a lot about how well the processes and products work. Still, organizations rarely use anomaly reports for more t...
Lars-Ola Damm, Lars Lundberg, Claes Wohlin
CTRSA
2008
Springer
172views Cryptology» more  CTRSA 2008»
13 years 9 months ago
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes. Our schemes have a security proof in the standard model, yet they offer performan...
Eike Kiltz, Yevgeniy Vahlis
DOCENG
2008
ACM
13 years 9 months ago
Improving query performance on XML documents: a workload-driven design approach
As XML has emerged as a data representation format and as great quantities of data have been stored in the XML format, XML document design has become an important and evident issu...
Rebeca Schroeder, Ronaldo dos Santos Mello
TCAD
2008
93views more  TCAD 2008»
13 years 7 months ago
Chip Optimization Through STI-Stress-Aware Placement Perturbations and Fill Insertion
Starting at the 65-nm node, stress engineering to improve the performance of transistors has been a major industry focus. An intrinsic stress source--shallow trench isolation (STI)...
Andrew B. Kahng, Puneet Sharma, Rasit Onur Topalog...
ICASSP
2011
IEEE
12 years 11 months ago
Audio identification based on spectral modeling of bark-bands energy and synchronization through onset detection
In this paper, we present for the first time the fingerprint IRCAM system for audio identification in streams. The baseline system relies on a double-nested Short Time Fourier ...
Mathieu Ramona, Geoffroy Peeters