Sciweavers

5630 search results - page 1023 / 1126
» Computability in Specification
Sort
View
267
Voted
EUROPKI
2009
Springer
15 years 2 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
GI
2009
Springer
15 years 2 months ago
A BPMN Case Study: Paper Review and Submission System
: We explore the expressiveness of the BPMN workflow modelling language by applying it to MuCoMS, a paper submission system. This well known application domain is a suitable exampl...
Markus Kirchberg, Ove Sörensen, Bernhard Thal...
GI
2009
Springer
15 years 2 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
HCI
2009
15 years 2 months ago
High-Fidelity Prototyping of Interactive Systems Can Be Formal Too
The design of safety critical systems calls for advanced software engineering models, methods and tools in order to meet the safety requirements that will avoid putting human life ...
Philippe A. Palanque, Jean-François Ladry, ...
ICCAD
2009
IEEE
133views Hardware» more  ICCAD 2009»
15 years 2 months ago
A parallel preconditioning strategy for efficient transistor-level circuit simulation
A parallel computing approach for large-scale SPICE-accurate circuit simulation is described that is based on a new preconditioned iterative solver. The preconditioner involves the...
Heidi Thornquist, Eric R. Keiter, Robert J. Hoekst...
« Prev « First page 1023 / 1126 Last » Next »