Sciweavers

2206 search results - page 325 / 442
» On the power of coercion abstraction
Sort
View
EUROCRYPT
2007
Springer
14 years 2 months ago
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Abstract. We introduce a notion of instance-dependent verifiable random functions (InstD-VRFs for short). Informally, an InstD-VRF is, in some sense, a verifiable random function [...
Yi Deng, Dongdai Lin
ER
2009
Springer
316views Database» more  ER 2009»
14 years 2 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 2 months ago
Self-Interference Suppression in Doubly-Selective Channel Estimation Using Superimposed Training
Abstract-- Channel estimation for frequency-selective timevarying channels is considered using superimposed training. We employ a discrete prolate spheroidal basis expansion model ...
Shuangchi He, Jitendra K. Tugnait
HIPEAC
2009
Springer
14 years 2 months ago
HeDGE: Hybrid Dataflow Graph Execution in the Issue Logic
Abstract. Exposing more instruction-level parallelism in out-of-order superscalar processors requires increasing the number of dynamic in-flight instructions. However, large instru...
Suriya Subramanian, Kathryn S. McKinley
ARCS
2004
Springer
14 years 1 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...