Sciweavers

10458 search results - page 1756 / 2092
» Modeling Features at Runtime
Sort
View
124
Voted
ASPDAC
2007
ACM
108views Hardware» more  ASPDAC 2007»
15 years 7 months ago
Software Performance Estimation in MPSoC Design
- Estimation tools are a key component of system-level methodologies, enabling a fast design space exploration. Estimation of software performance is essential in current software-...
Márcio Oyamada, Flávio Rech Wagner, ...
156
Voted
DIALM
2007
ACM
144views Algorithms» more  DIALM 2007»
15 years 7 months ago
Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures
Reliable broadcast can be a very useful primitive for many distributed applications, especially in the context of sensoractuator networks. Recently, the issue of reliable broadcas...
Vartika Bhandari, Nitin H. Vaidya
138
Voted
SIGIR
2010
ACM
15 years 7 months ago
Context-aware ranking in web search
The context of a search query often provides a search engine meaningful hints for answering the current query better. Previous studies on context-aware search were either focused ...
Biao Xiang, Daxin Jiang, Jian Pei, Xiaohui Sun, En...
181
Voted
GRAPHITE
2007
ACM
15 years 7 months ago
Appearance preserving octree-textures
Because of their geometric complexity, high resolution 3D models, either designed in high-end modeling packages or acquired with range scanning devices, cannot be directly used in...
Julien Lacoste, Tamy Boubekeur, Bruno Jobard, Chri...
131
Voted
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 7 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
« Prev « First page 1756 / 2092 Last » Next »