Sciweavers

204 search results - page 37 / 41
» Parameterizations of Test Cover with Bounded Test Sizes
Sort
View
ICASSP
2011
IEEE
14 years 2 months ago
Equiangular tight frame fingerprinting codes
We show that equiangular tight frames (ETFs) are particularly well suited as additive fingerprint designs against Gaussian averaging collusion attacks when the number of users is...
Dustin G. Mixon, Christopher J. Quinn, Negar Kiyav...
WCE
2007
14 years 11 months ago
Heuristic Based Approach of Cell Formation Considering Operation Sequence
—This paper presents, a two-stage heuristic based procedure for generating part family and machine cell formation in Cellular Manufacturing System. It decreases exceptional eleme...
Amit Rai Dixit, P. K. Mishra
SAC
2006
ACM
14 years 10 months ago
Efficient interactive configuration of unbounded modular systems
Interactive configuration guides a user searching through a large combinatorial space of solutions to a system of constraints. We investigate a class of very expressive underlying...
Erik Roland van der Meer, Andrzej Wasowski, Henrik...
ICLP
2010
Springer
14 years 8 months ago
A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification
We present a framework for (static) verification of general resource usage program properties. The framework extends the criteria of correctness as the conformance of a program to ...
Pedro López-García, Luthfi Darmawan,...
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 4 days ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III