Sciweavers

ATVA
2010
Springer
122views Hardware» more  ATVA 2010»
13 years 8 months ago
Synthesis: Words and Traces
The problem of synthesising a reactive system is discussed. The most standard instance of this problem ask to construct a finite input-output automaton satisfying a given regular s...
Igor Walukiewicz
ATS
2010
IEEE
250views Hardware» more  ATS 2010»
13 years 8 months ago
Efficient Embedding of Deterministic Test Data
Systems with many integrated circuits (ICs), often of the same type, are increasingly common to meet the constant performance demand. However, systems in recent semiconductor techn...
Mudassar Majeed, Daniel Ahlstrom, Urban Ingelsson,...
ADAC
2010
124views more  ADAC 2010»
13 years 8 months ago
Methods for merging Gaussian mixture components
The problem of merging Gaussian mixture components is discussed in situations where a Gaussian mixture is fitted but the mixture components are not separated enough from each othe...
Christian Hennig
ISCI
2010
155views more  ISCI 2010»
13 years 8 months ago
User comments for news recommendation in forum-based social media
Qing Li, Jia Wang, Yuanzhu Peter Chen, Zhangxi Lin
ISCI
2010
184views more  ISCI 2010»
13 years 8 months ago
A verifiable multi-secret sharing scheme based on cellular automata
Z. Eslami, J. Zarepour Ahmadabadi
ISCI
2010
162views more  ISCI 2010»
13 years 8 months ago
A visual shape descriptor using sectors and shape context of contour lines
Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-...
ISCI
2010
146views more  ISCI 2010»
13 years 8 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
ISCA
2010
IEEE
188views Hardware» more  ISCA 2010»
13 years 8 months ago
Guest Editor's Note
Dunren Che