Sciweavers

2748 search results - page 218 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
91
Voted
ISIM
2007
15 years 2 months ago
Software Architectures for Real-time Embedded Applications for Broadcasting
The paper discusses a choice of appropriate software architecture with regards to the specifications of embedded applications as information systems particularly used in area of ra...
Otto Zeleznik, Zdenek Havlice
100
Voted
PR
2008
145views more  PR 2008»
15 years 22 days ago
Gesture spotting with body-worn inertial sensors to detect user activities
We present a method for spotting sporadically occurring gestures in a continuous data stream from body-worn inertial sensors. Our method is based on a natural partitioning of cont...
Holger Junker, Oliver Amft, Paul Lukowicz, Gerhard...
81
Voted
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
117
Voted
VLDB
1990
ACM
143views Database» more  VLDB 1990»
15 years 4 months ago
Synthesizing Database Transactions
Database programming requires having the knowledge of database semantics both to maintain database integrity and to explore more optimization opportunities. Automated programming ...
Xiaolei Qian
IOR
2006
173views more  IOR 2006»
15 years 23 days ago
A Branch-and-Cut Algorithm for the Dial-a-Ride Problem
In the dial-a-ride problem, users formulate requests for transportation from a specific origin to a specific destination. Transportation is carried out by vehicles providing a sha...
Jean-François Cordeau