Sciweavers

1916 search results - page 93 / 384
» Reconfiguring a state machine
Sort
View
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
DATE
2002
IEEE
86views Hardware» more  DATE 2002»
14 years 26 days ago
A Layered, Codesign Virtual Machine Approach to Modeling Computer Systems
By using a macro/micro state model we show how assumptions on the resolution of logical and physical timing of computation in computer systems has resulted in design methodologies...
JoAnn M. Paul, Donald E. Thomas
ADS
2004
Springer
13 years 11 months ago
From Emotion to Interaction: Lessons from Real Human-Machine-Dialogues
The monitoring of emotional user states can help to assess the progress of human-machine-communication. If we look at specific databases, however, we are faced with several problem...
Anton Batliner, Christian Hacker, Stefan Steidl, E...
ACL
1998
13 years 9 months ago
Automatic Acquisition of Hierarchical Transduction Models for Machine Translation
We describe a method for the fully automatic learning of hierarchical finite state translation models. The input to the method is transcribed speech utterances and their correspon...
Hiyan Alshawi, Srinivas Bangalore, Shona Douglas
ERSHOV
2003
Springer
14 years 1 months ago
Integration of Functional and Timed Testing of Real-Time and Concurrent Systems
The article presents an approach to model based testing of complex systems based on a generalization of finite state machines (FSM) and input output state machines (IOSM). The app...
Victor V. Kuliamin, Alexandre Petrenko, Nick V. Pa...