Sciweavers

813 search results - page 120 / 163
» Pipeline-centric provenance model
Sort
View
FMCAD
2006
Springer
14 years 19 days ago
Liveness and Boundedness of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) have proven to be suitable for specifying and analyzing streaming applications that run on single- or multi-processor platforms. Streaming appl...
Amir Hossein Ghamarian, Marc Geilen, Twan Basten, ...
REX
1991
14 years 14 days ago
From Timed to Hybrid Systems
We propose a framework for the formal speci cation and veri cation of timed and hybrid systems. For timed systems we propose a speci cation language that refers to time only throug...
Oded Maler, Zohar Manna, Amir Pnueli
SGP
2007
13 years 11 months ago
Triangulations with locally optimal Steiner points
We present two new Delaunay refinement algorithms, second an extension of the first. For a given input domain (a set of points or a planar straight line graph), and a threshold an...
Hale Erten, Alper Üngör
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 11 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
EUROSPI
2008
Springer
13 years 10 months ago
A Software Engineering Lifecycle Standard for Very Small Enterprises
Industry recognizes that very small enterprises (VSE), that develop parts involving software components are very important to the economy. These parts are often integrated into pro...
Claude Y. Laporte, Simon Alexandre, Rory O'Connor