Sciweavers

773 search results - page 104 / 155
» Report on a Practical Application of ASMs in Software Design
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 10 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
LREC
2008
172views Education» more  LREC 2008»
13 years 10 months ago
A Common Multimedia Annotation Framework for Cross Linking Cultural Heritage Digital Collections
In the context of the CATCH research program that is currently carried out at a number of large Dutch cultural heritage institutions our ambition is to combine and exchange hetero...
Hennie Brugman, Véronique Malaisé, L...
KBSE
2009
IEEE
14 years 3 months ago
Static Validation of C Preprocessor Macros
—The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CP...
Andreas Saebjoernsen, Lingxiao Jiang, Daniel J. Qu...
SENSYS
2010
ACM
13 years 6 months ago
Evolution and sustainability of a wildlife monitoring sensor network
As sensor network technologies become more mature, they are increasingly being applied to a wide variety of applications, ranging from agricultural sensing to cattle, oceanic and ...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...
DIAGRAMS
2004
Springer
14 years 2 months ago
Bayesian Boxes: A Colored Calculator for Picturing Posteriors
The need for Bayesian inference arises in military intelligence, medical diagnosis and many other practical applications. The problem is that human inferences are generally conserv...
Kevin Burns