Sciweavers

3533 search results - page 576 / 707
» Information theory and Thermodynamics
Sort
View
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 2 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ENTCS
2008
138views more  ENTCS 2008»
15 years 2 months ago
Compositionality of Statically Scheduled IP
Timing Closure in presence of long global wire interconnects is one of the main current issues in System-onChip design. One proposed solution to the Timing Closure problem is Late...
Julien Boucaron, Jean-Vivien Millo
EOR
2008
95views more  EOR 2008»
15 years 2 months ago
Enabling e-transactions with multi-attribute preference models
This paper describes potential applications of multi-attribute preference models (MAPM) in e-commerce and offers some guidelines for their implementation. MAPM are methodologies f...
John C. Butler, James S. Dyer, Jianmin Jia, Kerem ...
FTML
2008
185views more  FTML 2008»
15 years 2 months ago
Graphical Models, Exponential Families, and Variational Inference
The formalism of probabilistic graphical models provides a unifying framework for capturing complex dependencies among random variables, and building large-scale multivariate stat...
Martin J. Wainwright, Michael I. Jordan
CJ
2006
123views more  CJ 2006»
15 years 2 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...