Sciweavers

992 search results - page 29 / 199
» Transfer Function Fusing
Sort
View
INFORMATICALT
1998
145views more  INFORMATICALT 1998»
13 years 8 months ago
Design of Reusable VHDL Component Using External Functions
This paper describes a method how to represent and build a reusable VHDL component. By that component we can, for example, describe a family of the relative VHDL models. To represe...
Vytautas Stuikys
FROCOS
2005
Springer
14 years 2 months ago
Connecting Many-Sorted Structures and Theories Through Adjoint Functions
In a previous paper, we have introduced a general approach for connecting two many-sorted theories through connection functions that behave like homomorphisms on the shared signatu...
Franz Baader, Silvio Ghilardi
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
14 years 2 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
14 years 1 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu
COMCOM
2011
13 years 4 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell