Sciweavers

7475 search results - page 1378 / 1495
» Supporting use case based requirements engineering
Sort
View
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
JCST
2007
151views more  JCST 2007»
15 years 4 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng
150
Voted
ICIP
2009
IEEE
15 years 2 months ago
Wyner-Ziv to H.264 video transcoder
-- This paper proposes a Wyner-Ziv / H.264 transcoder that enables low cost video applications. The proposed solution supports video encoding on resource constrained devices such a...
José Luis Martínez, Hari Kalva, Gera...
OOPSLA
2009
Springer
15 years 11 months ago
Towards automation of iteration planning
Iterations are time-boxed periods with an intended outcome that is often a set of implemented requirements. Iterations are part of most common software development lifecycle model...
Jonas Helming, Maximilian Koegel, Zardosht Hodaie
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 10 months ago
Omnisphere: a Personal Communication Environment
Small ubiquitous devices connected by wireless networks will become future Internet appliances. To support them, communication networks must evolve to seamlessly assist appliances...
Franck Rousseau, Justinian Oprescu, Laurentiu-Sori...
« Prev « First page 1378 / 1495 Last » Next »