Sciweavers

1965 search results - page 200 / 393
» On the analysis of interacting pushdown systems
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 4 months ago
On the Impact of Carrier Frequency Offsets in OFDM/SDMA Systems
— The combined OFDM/SDMA approach has raised lots of research interests recently as it appears to be quite suitable for future broadband wireless transmission. In order to build ...
Sheng Zhou, Kai Zhang, Zhisheng Niu
SE
2007
13 years 11 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
SAMOS
2009
Springer
14 years 4 months ago
Visualization of Computer Architecture Simulation Data for System-Level Design Space Exploration
System-level computer architecture simulations create large volumes of simulation data to explore alternative architectural solutions. Interpreting and drawing conclusions from thi...
Toktam Taghavi, Mark Thompson, Andy D. Pimentel
ISBI
2007
IEEE
14 years 4 months ago
Design and Calibration of a Virtual Tomographic Reflection System
Virtual Tomographic Reflection (VTR) is a new augmented reality technique that allows users to view volumetric image data using an interaction paradigm based on medical ultrasoun...
Damion Shelton, Bing Wu, Roberta L. Klatzky, Georg...