Sciweavers

3554 search results - page 616 / 711
» Estimating software based on use case points
Sort
View
141
Voted
BMCBI
2010
182views more  BMCBI 2010»
15 years 5 months ago
Beyond co-localization: inferring spatial interactions between sub-cellular structures from microscopy images
Background: Sub-cellular structures interact in numerous direct and indirect ways in order to fulfill cellular functions. While direct molecular interactions crucially depend on s...
Jo A. Helmuth, Grégory Paul, Ivo F. Sbalzar...
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 5 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
CASES
2005
ACM
15 years 7 months ago
A post-compilation register reassignment technique for improving hamming distance code compression
Code compression is a field where compression ratios between compiler-generated code and subsequent compressed code are highly dependent on decisions made at compile time. Most op...
Montserrat Ros, Peter Sutton
318
Voted
CASES
2011
ACM
14 years 5 months ago
Enabling parametric feasibility analysis in real-time calculus driven performance evaluation
This paper advocates a rigorously formal and compositional style for obtaining key performance and/or interface metrics of systems with real-time constraints. We propose a hierarc...
Alena Simalatsar, Yusi Ramadian, Kai Lampka, Simon...
AOSD
2003
ACM
15 years 10 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...