Sciweavers

1187 search results - page 188 / 238
» Computation in Extended Argumentation Frameworks
Sort
View
116
Voted
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
SADM
2008
178views more  SADM 2008»
15 years 2 days ago
Fast Projection-Based Methods for the Least Squares Nonnegative Matrix Approximation Problem
: Nonnegative matrix approximation (NNMA) is a popular matrix decomposition technique that has proven to be useful across a diverse variety of fields with applications ranging from...
Dongmin Kim, Suvrit Sra, Inderjit S. Dhillon
TMI
2010
219views more  TMI 2010»
14 years 7 months ago
Registration of 4D Cardiac CT Sequences Under Trajectory Constraints With Multichannel Diffeomorphic Demons
Abstract--We propose a framework for the nonlinear spatiotemporal registration of 4D time-series of images based on the Diffeomorphic Demons (DD) algorithm. In this framework, the ...
Jean-Marc Peyrat, Herve Delingette, Maxime Sermesa...
ICCSA
2010
Springer
14 years 10 months ago
An Aspect-Oriented Approach for Mobile Embedded Software Modeling
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma, Wong...
116
Voted
SLIP
2003
ACM
15 years 5 months ago
Perimeter-degree: a priori metric for directly measuring and homogenizing interconnection complexity in multilevel placement
In this paper, we describe an accurate metric (perimeter-degree) for measuring interconnection complexity and effective use of it for controlling congestion in a multilevel framew...
Navaratnasothie Selvakkumaran, Phiroze N. Parakh, ...