Sciweavers

953 search results - page 100 / 191
» Constraint Based Transformation Theory
Sort
View
DAC
1997
ACM
15 years 2 months ago
Methodology for Behavioral Synthesis-Based Algorithm-Level Design Space Exploration: DCT Case Study
: Numerous fast algorithms for the Discrete Cosine Transform DCT have been proposed. Until recently, it has been di cult to compare di erent DCT algorithms and select one which i...
Miodrag Potkonjak, Kyosun Kim, Ramesh Karri
IJISMD
2010
164views more  IJISMD 2010»
14 years 7 months ago
Management of Correctness Problems in UML Class Diagrams Towards a Pattern-Based Approach
UML is now widely accepted as the standard modeling language for software construction. The Class Diagram is its core view, having well formed semantics and providing the backbone...
Mira Balaban, Azzam Maraee, Arnon Sturm
KDD
2008
ACM
161views Data Mining» more  KDD 2008»
15 years 10 months ago
Locality sensitive hash functions based on concomitant rank order statistics
: Locality Sensitive Hash functions are invaluable tools for approximate near neighbor problems in high dimensional spaces. In this work, we are focused on LSH schemes where the si...
Kave Eshghi, Shyamsundar Rajaram
CCS
2005
ACM
15 years 3 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ISOLA
2010
Springer
14 years 8 months ago
Flow Control with (Min, +) Algebra
According to the theory of Network Calculus based on the (min,+) algebra, analysis and measure of worst-case performance in communication networks can be made easily. In this conte...
Euriell Le Corronc, Bertrand Cottenceau, Laurent H...