Sciweavers

99 search results - page 10 / 20
» Inspection by Implicit Polynomials
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
ICSM
1997
IEEE
15 years 2 months ago
Dynamic Traceability Links Supported by a System Architecture Description
To reduce the effort spent on system comprehension during software maintenance, easy access to different type of information describing the system features is necessary. This is u...
Eirik Tryggeseth, Øystein Nytrø
GIL
2004
14 years 11 months ago
Verzichten die Landwirte zu (Un)Recht auf den Einsatz von Optimierungsverfahren?
Abstract: In this paper we examine the usefulness of optimisation methods for practical farm program decisions. We inspect three Brandenburg cash crop farms over the last five year...
Oliver Mußhoff, Norbert Hirschauer
WSCG
2004
232views more  WSCG 2004»
14 years 11 months ago
3D Shape Extraction Using Photographic Tomography with Its Applications
Tomographic imaging is a technique for exploration of a cross-section of an inspected object without destruction. Normally, the input data, known as the projections, are gathered ...
S. Reruang, Withawat Withayachumnankul, Chuchart P...
TSP
2008
116views more  TSP 2008»
14 years 9 months ago
Computation of Delay-Free Nonlinear Digital Filter Networks: Application to Chaotic Circuits and Intracellular Signal Transducti
Abstract--A method for the computation of nonlinear digital filter networks containing delay-free loops is proposed. By preserving the topology of the network this method permits t...
Federico Fontana, Federico Avanzini