Sciweavers

1628 search results - page 109 / 326
» Compiler Construction Using Scheme
Sort
View
FC
2006
Springer
96views Cryptology» more  FC 2006»
15 years 6 months ago
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the identities of these users. We discover that current s...
Adam Barth, Dan Boneh, Brent Waters
111
Voted
WSC
2008
15 years 4 months ago
The use of simulation for process improvement in metal industry - case HT-Lasertekniikka
Companies in the metal industry want to find solutions for increasing the quality of service and productivity of the operation, but it is not an easy task to do, especially if the...
Toni Ruohonen, Mikko Kamppila, Antti Jokitalo
SIAMNUM
2010
105views more  SIAMNUM 2010»
14 years 9 months ago
Quantization Based Filtering Method Using First Order Approximation
The quantization based filtering method (see [13], [14]) is a grid based approximation method to solve nonlinear filtering problems with discrete time observations. It relies on o...
Afef Sellami
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
15 years 8 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
125
Voted
PLDI
2006
ACM
15 years 8 months ago
Automatic instruction scheduler retargeting by reverse-engineering
In order to generate high-quality code for modern processors, a compiler must aggressively schedule instructions, maximizing resource utilization for execution efficiency. For a ...
Matthew J. Bridges, Neil Vachharajani, Guilherme O...