Sciweavers

3713 search results - page 262 / 743
» Quantum Information Theory
Sort
View
DAC
2007
ACM
14 years 11 months ago
Synchronous Elastic Circuits with Early Evaluation and Token Counterflow
A protocol for latency-insensitive design with early evaluation is presented. The protocol is based on a symmetric view of the system in which tokens carrying information move in ...
Jordi Cortadella, Michael Kishinevsky
POPL
2007
ACM
14 years 11 months ago
Assessing security threats of looping constructs
There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pi...
Pasquale Malacaria
LOCWEB
2009
ACM
14 years 5 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
14 years 5 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
ICPR
2008
IEEE
14 years 5 months ago
Face recognition using Complete Fuzzy LDA
In this paper, we propose a novel method for feature extraction and recognition, namely, Complete Fuzzy LDA (CFLDA). CFLDA combines the complete LDA and fuzzy set theory. CFLDA re...
Wankou Yang, Hui Yan, Jianguo Wang, Jingyu Yang