Sciweavers

2100 search results - page 384 / 420
» Relational Topographic Maps
Sort
View
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
14 years 4 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...
ER
2007
Springer
129views Database» more  ER 2007»
14 years 4 months ago
A Methodology and Toolkit for Deploying Contract Documents as E-contracts
Recent research in e-contracts is concerned with the development of frameworks and tools to support contracts. EREC framework is one that enables modelling and deployment of e-con...
Anushree Khandekar, P. Radha Krishna, Kamalakar Ka...
ESWS
2007
Springer
14 years 4 months ago
A Reasoning Framework for Rule-Based WSML
WSML is an ontology language specifically tailored to annotate Web Services, and part of its semantics adheres to the rule-based knowledge representation paradigm of logic program...
Stephan Grimm, Uwe Keller, Holger Lausen, Gá...
LCTRTS
2007
Springer
14 years 4 months ago
Scratchpad allocation for data aggregates in superperfect graphs
Existing methods place data or code in scratchpad memory, i.e., SPM by either relying on heuristics or resorting to integer programming or mapping it to a graph coloring problem. ...
Lian Li 0002, Quan Hoang Nguyen, Jingling Xue
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 4 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...