Sciweavers

859 search results - page 112 / 172
» Implementing CMMI using a Combination of Agile Methods
Sort
View
TACS
1997
Springer
15 years 8 months ago
A Type-Theoretic Approach to Deadlock-Freedom of Asynchronous Systems
We present a type-based technique for the veri cation of deadlock-freedom in asynchronous concurrent systems. Our general approach is to start with a simple interaction category, i...
Samson Abramsky, Simon J. Gay, Rajagopal Nagarajan
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
15 years 7 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin
DKE
2007
105views more  DKE 2007»
15 years 4 months ago
On compressing frequent patterns
A major challenge in frequent-pattern mining is the sheer size of its mining results. To compress the frequent patterns, we propose to cluster frequent patterns with a tightness m...
Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng
JUCS
2007
104views more  JUCS 2007»
15 years 4 months ago
Real-time Architecture for Robust Motion Estimation under Varying Illumination Conditions
: Motion estimation from image sequences is a complex problem which requires high computing resources and is highly affected by changes in the illumination conditions in most of th...
Javier Díaz, Eduardo Ros, Rafael Rodr&iacut...
TON
2010
167views more  TON 2010»
14 years 11 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...