Sciweavers

15253 search results - page 2827 / 3051
» Integer-Programming Software Systems
Sort
View
101
Voted
SIGGRAPH
1995
ACM
15 years 7 months ago
Polygon-assisted JPEG and MPEG compression of synthetic images
Recent advances in realtime image compression and decompression hardware make it possible for a high-performance graphics engine to operate as a rendering server in a networked en...
Marc Levoy
139
Voted
ASIACRYPT
2009
Springer
15 years 6 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
ASM
2010
ASM
15 years 6 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
121
Voted
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 6 months ago
Suffix tree construction algorithms on modern hardware
Suffix trees are indexing structures that enhance the performance of numerous string processing algorithms. In this paper, we propose cache-conscious suffix tree construction algo...
Dimitris Tsirogiannis, Nick Koudas
111
Voted
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
15 years 6 months ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...
« Prev « First page 2827 / 3051 Last » Next »