Sciweavers

4245 search results - page 820 / 849
» Input Modeling
Sort
View
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
EMSOFT
2007
Springer
15 years 8 months ago
Methods for multi-dimensional robustness optimization in complex embedded systems
Design space exploration of embedded systems typically focuses on classical design goals such as cost, timing, buffer sizes, and power consumption. Robustness criteria, i.e. sensi...
Arne Hamann, Razvan Racu, Rolf Ernst
RECOMB
2007
Springer
15 years 8 months ago
Network Legos: Building Blocks of Cellular Wiring Diagrams
Publicly-available data sets provide detailed and large-scale information on multiple types of molecular interaction networks in a number of model organisms. These multi-modal univ...
T. M. Murali, Corban G. Rivera
ECRTS
2006
IEEE
15 years 8 months ago
Hierarchical Control of Multiple Resources in Distributed Real-time and Embedded Systems
There is an increasing demand to introduce adaptive capabilities in distributed real-time and embedded (DRE) systems that execute in open environments where system operational con...
Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas...
ICMCS
2006
IEEE
215views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Biologically vs. Logic Inspired Encoding of Facial Actions and Emotions in Video
Automatic facial expression analysis is an important aspect of Human Machine Interaction as the face is an important communicative medium. We use our face to signal interest, disa...
Michel François Valstar, Maja Pantic