Sciweavers

1082 search results - page 200 / 217
» interactions 2000
Sort
View
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
POPL
2008
ACM
14 years 8 months ago
Demand-driven alias analysis for C
This paper presents a demand-driven, flow-insensitive analysis algorithm for answering may-alias queries. We formulate the computation of alias queries as a CFL-reachability probl...
Xin Zheng, Radu Rugina
CGO
2007
IEEE
14 years 2 months ago
Microarchitecture Sensitive Empirical Models for Compiler Optimizations
This paper proposes the use of empirical modeling techniques for building microarchitecture sensitive models for compiler optimizations. The models we build relate program perform...
Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. S...
IWANN
2005
Springer
14 years 1 months ago
Real-Time Spiking Neural Network: An Adaptive Cerebellar Model
Abstract. A spiking neural network modeling the cerebellum is presented. The model, consisting of more than 2000 conductance-based neurons and more than 50 000 synapses, runs in re...
Christian Boucheny, Richard R. Carrillo, Eduardo R...
KR
2004
Springer
14 years 1 months ago
Advanced Research with Autonomous Unmanned Aerial Vehicles
Abstract The emerging area of intelligent unmanned aerial vehicle (UAV) research has shown rapid development in recent years and offers a great number of research challenges for ar...
Patrick Doherty