Sciweavers

1891 search results - page 216 / 379
» Constrained Subspace Modelling
Sort
View
CEC
2007
IEEE
15 years 10 months ago
Graph design by graph grammar evolution
— Determining the optimal topology of a graph is pertinent to many domains, as graphs can be used to model a variety of systems. Evolutionary algorithms constitute a popular opti...
Martin H. Luerssen, David M. W. Powers
122
Voted
ICC
2007
IEEE
15 years 10 months ago
Combating Media Noise for High-Density Optical Recording
— Media noise is the dominant noise that severely degrades the channel detector’s performance for high-density optical recording. In this paper, we first propose a simple but ...
Kui Cai, Yong Ning Foo, Jan W. M. Bergmans
131
Voted
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
FSEN
2007
Springer
15 years 9 months ago
Regulating Data Exchange in Service Oriented Applications
We define a type system for COWS, a formalism for specifying and combining services, while modelling their dynamic behaviour. Our types permit to express policies constraining dat...
Alessandro Lapadula, Rosario Pugliese, Francesco T...
114
Voted
SEFM
2005
IEEE
15 years 9 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider