Sciweavers

21324 search results - page 260 / 4265
» Making the case for computing
Sort
View
80
Voted
DM
2002
79views more  DM 2002»
15 years 3 months ago
On large complete arcs: odd case
An approach to the computations of upper bounds on the size of large complete arcs is presented. In particular, we obtain geometrical properties of irreducible envelopes associated...
Massimo Giulietti, Fernanda Pambianco, Fernando To...
TSE
2010
123views more  TSE 2010»
14 years 10 months ago
Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model Checking
Current stochastic model checkers do not make counterexamples for property violations readily available. In this paper we apply directed explicit state space search to discrete- a...
Husain Aljazzar, Stefan Leue
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
ICASSP
2009
IEEE
15 years 11 months ago
On the performance of semidefinite relaxation MIMO detectors for QAM constellations
Due to their computational efficiency and strong empirical performance, semidefinite relaxation (SDR)–based algorithms have gained much attention in multiple–input multiple...
Anthony Man-Cho So
RTCSA
2009
IEEE
15 years 11 months ago
Bounding the Maximum Length of Non-preemptive Regions under Fixed Priority Scheduling
The question whether preemptive systems are better than non-preemptive systems has been debated for a long time, but only partial answers have been provided in the real-time liter...
Gang Yao, Giorgio C. Buttazzo, Marko Bertogna