Sciweavers

1301 search results - page 48 / 261
» Specifications via Realizability
Sort
View
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
14 years 2 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
ASPDAC
2004
ACM
74views Hardware» more  ASPDAC 2004»
14 years 1 months ago
Optimal design of high fan-in multiplexers via mixed-integer nonlinear programming
- In this paper, a novel strategy for designing the heterogeneous-tree multiplexer is proposed. We build the multiplexer delay model by curve fitting and then formulate the heterog...
Hsu-Wei Huang, Cheng-Yeh Wang, Jing-Yang Jou
CAISE
2006
Springer
14 years 1 months ago
Inter Model Data Exchange of Type Information via a Common Type Hierarchy
Data exchange between heterogeneous schemas is a difficult problem that becomes more acute if the source and target schemas are from different data models. The data type of the obj...
Andrew Smith, Peter McBrien
CICLING
2008
Springer
13 years 12 months ago
Improving Question Answering by Combining Multiple Systems Via Answer Validation
Nowadays there exist several kinds of question answering systems. According to recent evaluation results, most of these systems are complementary (i.e., each one is better than the...
Alberto Téllez-Valero, Manuel Montes-y-G&oa...
DAGSTUHL
2004
13 years 11 months ago
Adaptive Rich Media Presentations via Preference-Based Constrained Optimization
Personalization and adaptation of multi-media messages are well known and well studied problems. Ideally, each message should reflect its recipient's interests, device capabi...
Ronen I. Brafman, Doron A. Friedman