Sciweavers

12981 search results - page 2459 / 2597
» Model Checking and Abstraction
Sort
View
HIPEAC
2007
Springer
15 years 7 months ago
A Throughput-Driven Task Creation and Mapping for Network Processors
Abstract. Network processors are programmable devices that can process packets at a high speed. A network processor is typified by multithreading and heterogeneous multiprocessing...
Lixia Liu, Xiao-Feng Li, Michael K. Chen, Roy Dz-C...
ICCS
2007
Springer
15 years 7 months ago
High Quality Surface Mesh Generation for Multi-physics Bio-medical Simulations
Abstract. Manual surface reconstruction is still an everyday practice in applications involving complex irregular domains necessary for modeling biological systems. Rapid developme...
Dominik Szczerba, Robert H. P. McGregor, Gá...
OTM
2007
Springer
15 years 7 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
SPEAKERC
2007
Springer
312views Biometrics» more  SPEAKERC 2007»
15 years 7 months ago
Development of a Femininity Estimator for Voice Therapy of Gender Identity Disorder Clients
Abstract. This work describes the development of an automatic estimator of perceptual femininity (PF) of an input utterance using speaker verification techniques. The estimator wa...
Nobuaki Minematsu, Kyoko Sakuraba
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 7 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
« Prev « First page 2459 / 2597 Last » Next »