Sciweavers

1615 search results - page 150 / 323
» What's new
Sort
View
ISCAS
2003
IEEE
113views Hardware» more  ISCAS 2003»
14 years 2 months ago
Optimum word length allocation for multipliers of integer DCT
Recently, the integer DCT (Int-DCT), which has the rounding operations in the lifting structure, is attracting many researchers' attention as an effective method for DCT base...
Masahiro Iwahashi, Osamu Nishida, Somchart Chokcha...
UIST
2003
ACM
14 years 2 months ago
User interface continuations
Dialog boxes that collect parameters for commands often create ephemeral, unnatural interruptions of a program’s normal execution flow, encouraging the user to complete the dial...
Dennis Quan, David Huynh, David R. Karger, Robert ...
CAISE
2003
Springer
14 years 2 months ago
SIM-Filter: User Profile based Smart Information Filtering and Personalization in Smartcard
The emergence of new information and communication system technologies allow the appearance of new techniques of data processing. Thus, it is increasingly difficult to user to find...
Abdelkrim Lahlou, Pascal Urien
ICFEM
2003
Springer
14 years 2 months ago
Formalization, Testing and Execution of a Use Case Diagram
Abstract. Errors in a requirements model have prolonged detrimental effects on reliability, cost, and safety of a software system. It is very costly to fix these errors in later ...
Wuwei Shen, Shaoying Liu
EUROCRYPT
2010
Springer
14 years 1 months ago
Cryptographic Agility and Its Relation to Circular Encryption
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...