Sciweavers

6120 search results - page 1041 / 1224
» The Power of Linear Functions
Sort
View
144
Voted
ASIACRYPT
2003
Springer
15 years 7 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
163
Voted
CODES
2001
IEEE
15 years 7 months ago
System canvas: a new design environment for embedded DSP and telecommunication systems
We present a new design environment, called System Canvas, targeted at DSP and telecommunication system designs. Our environment uses an easy-to-use block-diagram syntax to specif...
Praveen K. Murthy, Etan G. Cohen, Steve Rowland
155
Voted
ISMIS
2000
Springer
15 years 7 months ago
Design of Rough Neurons: Rough Set Foundation and Petri Net Model
This paper introduces the design of rough neurons based on rough sets. Rough neurons instantiate approximate reasoning in assessing knowledge gleaned from input data. Each neuron c...
James F. Peters, Andrzej Skowron, Zbigniew Suraj, ...
132
Voted
ARVLSI
1995
IEEE
132views VLSI» more  ARVLSI 1995»
15 years 7 months ago
Standard CMOS active pixel image sensors for multimedia applications
The task of image acquisition is completely dominated by CCD-based sensors fabricated on specialized process lines. These devices provide an essentially passive means of detecting...
Alex G. Dickinson, Bryan D. Ackland, El-Sayed Eid,...
120
Voted
RTA
1991
Springer
15 years 7 months ago
Completeness of Combinations of Constructor Systems
A term rewriting system is called complete if it is both confluent and strongly norrealizing. Barendregt and Klop showed that the disjoint union of complete term rewriting systems...
Aart Middeldorp, Yoshihito Toyama
« Prev « First page 1041 / 1224 Last » Next »