Sciweavers

416 search results - page 60 / 84
» Modeling Input Validation in UML
Sort
View
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
14 years 27 days ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
DATE
2002
IEEE
101views Hardware» more  DATE 2002»
14 years 19 days ago
EAC: A Compiler Framework for High-Level Energy Estimation and Optimization
This paper presents a novel Energy-Aware Compilation (EAC) framework that can estimate and optimize energy consumption of a given code taking as input the architectural and techno...
Ismail Kadayif, Mahmut T. Kandemir, Narayanan Vija...
CODES
2004
IEEE
13 years 11 months ago
Multi-objective mapping for mesh-based NoC architectures
In this paper we present an approach to multi-objective exploration of the mapping space of a mesh-based network-on-chip architecture. Based on evolutionary computing techniques, ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
EDBTW
2006
Springer
13 years 11 months ago
A Calculus for Propagating Semantic Annotations Through Scientific Workflow Queries
Scientific workflows facilitate automation, reuse, and reproducibility of scientific data management and analysis tasks. Scientific workflows are often modeled as dataflow networks...
Shawn Bowers, Bertram Ludäscher
ICDM
2009
IEEE
142views Data Mining» more  ICDM 2009»
13 years 5 months ago
Building Classifiers with Independency Constraints
In this paper we study the problem of classifier learning where the input data contains unjustified dependencies between some data attributes and the class label. Such cases arise...
Toon Calders, Faisal Kamiran, Mykola Pechenizkiy