Sciweavers

1370 search results - page 90 / 274
» Towards Automatic Generation of Natural Language Generation ...
Sort
View
CCS
2010
ACM
15 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
164
Voted
ICST
2010
IEEE
15 years 3 months ago
Towards a Testing Methodology for Reactive Systems: A Case Study of a Landing Gear Controller
—In this case study we test a landing gear control system of a military aircraft with the new version of LUTESS, a tool for testing automatically synchronous software. LUTESS req...
Laya Madani, Virginia Papailiopoulou, Ioannis Pari...
140
Voted
ICS
2009
Tsinghua U.
15 years 11 months ago
Computer generation of fast fourier transforms for the cell broadband engine
The Cell BE is a multicore processor with eight vector accelerators (called SPEs) that implement explicit cache management through direct memory access engines. While the Cell has...
Srinivas Chellappa, Franz Franchetti, Markus P&uum...
DKE
2011
251views Education» more  DKE 2011»
14 years 11 months ago
Generating operation specifications from UML class diagrams: A model transformation approach
One of the more tedious and complex tasks during the specification of conceptual schemas (CSs) is modeling the operations that define the system behavior. This paper aims to simpl...
Manoli Albert, Jordi Cabot, Cristina Gómez,...
142
Voted
CONSTRAINTS
1998
108views more  CONSTRAINTS 1998»
15 years 4 months ago
Constraints in Graph Drawing Algorithms
Graphs are widely used for information visualization purposes, since they provide a natural and intuitive tation of complex abstract structures. The automatic generation of drawing...
Roberto Tamassia