Sciweavers

4299 search results - page 732 / 860
» Concurrent Test Generation
Sort
View
ECCC
2007
144views more  ECCC 2007»
15 years 3 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
ENTCS
2007
126views more  ENTCS 2007»
15 years 3 months ago
Nominal Reasoning Techniques in Coq: (Extended Abstract)
d Abstract) Brian Aydemir Aaron Bohannon Stephanie Weirich Department of Computer and Information Science University of Pennsylvania Philadelphia, PA, USA We explore an axiomatize...
Brian E. Aydemir, Aaron Bohannon, Stephanie Weiric...
113
Voted
JSAC
2006
120views more  JSAC 2006»
15 years 3 months ago
Multiple-Source Internet Tomography
Abstract-- Information about the topology and link-level characteristics of a network is critical for many applications including network diagnostics and management. However, this ...
Michael Rabbat, Mark Coates, Robert D. Nowak
ET
2007
67views more  ET 2007»
15 years 3 months ago
A Formal Analysis of Fault Diagnosis with D-matrices
As new approaches and algorithms are developed for system diagnosis, it is important to reflect on existing approaches to determine their strengths and weaknesses. Of concern is i...
John W. Sheppard, S. G. W. Butcher
130
Voted
FCSC
2007
108views more  FCSC 2007»
15 years 3 months ago
Offline Chinese handwriting recognition: an assessment of current technology
Offline Chinese handwriting recognition (OCHR) is a typically difficult pattern recognition problem. Many authors have presented various approaches to recognizing its different asp...
Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball