Sciweavers

602 search results - page 72 / 121
» Program Calculation in Coq
Sort
View
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 9 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
CVPR
2010
IEEE
13 years 7 months ago
Efficient computation of robust low-rank matrix approximations in the presence of missing data using the L1 norm
The calculation of a low-rank approximation of a matrix is a fundamental operation in many computer vision applications. The workhorse of this class of problems has long been the ...
Anders Eriksson, Anton van den Hengel
TII
2010
124views Education» more  TII 2010»
13 years 3 months ago
Address-Independent Estimation of the Worst-case Memory Performance
Abstract--Real-time systems are subject to temporal constraints and require a schedulability analysis to ensure that task execution finishes within lower and upper specified bounds...
Basilio B. Fraguela, Diego Andrade, Ramon Doallo
CHI
2006
ACM
14 years 9 months ago
Evaluating a fisheye view of source code
Navigating and understanding the source code of a program are highly challenging activities. This paper introduces a fisheye view of source code to a Java programming environment....
Mikkel Rønne Jakobsen, Kasper Hornbæk
SIGUCCS
2003
ACM
14 years 2 months ago
Deep in budget restraints: return on investment (ROI)
The University of Missouri–Columbia’s Information and Access Technology (IAT) Services division’s InfoTech Training department measures IT training using the return on inves...
Terry Robb, Joleen Pfefer