Sciweavers

2351 search results - page 302 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
PKC
2004
Springer
151views Cryptology» more  PKC 2004»
15 years 10 months ago
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
Toru Akishita, Tsuyoshi Takagi
UML
2001
Springer
15 years 9 months ago
Estimating Software Development Effort Based on Use Cases-Experiences from Industry
Use case models are used in object-oriented analysis for capturing and describing the functional requirements of a system. Several methods for estimating software development effor...
Bente Anda, Hege Dreiem, Dag I. K. Sjøberg,...
ICCAD
1998
IEEE
94views Hardware» more  ICCAD 1998»
15 years 9 months ago
Noise considerations in circuit optimization
Noise can cause digital circuits to switch incorrectly and thus produce spurious results. Noise can also have adverse power, timing and reliability e ects. Dynamic logic is partic...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...
178
Voted
PODS
1991
ACM
131views Database» more  PODS 1991»
15 years 8 months ago
Termination Detection in Logic Programs using Argument Sizes
d Abstract Kirack Sohn and Allen Van Gelder University of California, Santa Cruz Progress on automated termination detection for logic programs is reported. The prospects for han...
Kirack Sohn, Allen Van Gelder
CIKM
2008
Springer
15 years 7 months ago
Web-scale named entity recognition
Automatic recognition of named entities such as people, places, organizations, books, and movies across the entire web presents a number of challenges, both of scale and scope. Da...
Casey Whitelaw, Alexander Kehlenbeck, Nemanja Petr...