Sciweavers

406 search results - page 43 / 82
» Constraints on Strong Generative Power
Sort
View
92
Voted
CARDIS
1998
Springer
89views Hardware» more  CARDIS 1998»
15 years 5 months ago
Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card t...
Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim R...
89
Voted
BIRTHDAY
1997
Springer
15 years 5 months ago
Controlled Fuzzy Parallel Rewriting
We study a Lindenmayer-like parallel rewriting system to model the growth of filaments (arrays of cells) in which developmental errors may occur. In essence this model is the fuzz...
Peter R. J. Asveld
112
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Whole word discriminative point process models
This paper introduces a discriminative extension to whole-word point process modeling techniques. Meant to circumvent the strong independence assumptions of their generative prede...
Aren Jansen
89
Voted
VLSID
2008
IEEE
120views VLSI» more  VLSID 2008»
16 years 1 months ago
Continuous Frequency Adjustment Technique Based on Dynamic Workload Prediction
Real-time embedded systems increasingly rely on dynamic power management to balance between power and performance goals. In this paper, we present a technique for continuous frequ...
Hwisung Jung, Massoud Pedram
ASPDAC
2009
ACM
164views Hardware» more  ASPDAC 2009»
15 years 7 months ago
Accounting for non-linear dependence using function driven component analysis
Majority of practical multivariate statistical analyses and optimizations model interdependence among random variables in terms of the linear correlation among them. Though linear...
Lerong Cheng, Puneet Gupta, Lei He