Sciweavers

813 search results - page 120 / 163
» Pipeline-centric provenance model
Sort
View
FMCAD
2006
Springer
15 years 2 months ago
Liveness and Boundedness of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) have proven to be suitable for specifying and analyzing streaming applications that run on single- or multi-processor platforms. Streaming appl...
Amir Hossein Ghamarian, Marc Geilen, Twan Basten, ...
98
Voted
REX
1991
15 years 2 months ago
From Timed to Hybrid Systems
We propose a framework for the formal speci cation and veri cation of timed and hybrid systems. For timed systems we propose a speci cation language that refers to time only throug...
Oded Maler, Zohar Manna, Amir Pnueli
SGP
2007
15 years 1 months ago
Triangulations with locally optimal Steiner points
We present two new Delaunay refinement algorithms, second an extension of the first. For a given input domain (a set of points or a planar straight line graph), and a threshold an...
Hale Erten, Alper Üngör
85
Voted
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 24 days ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
EUROSPI
2008
Springer
15 years 18 days ago
A Software Engineering Lifecycle Standard for Very Small Enterprises
Industry recognizes that very small enterprises (VSE), that develop parts involving software components are very important to the economy. These parts are often integrated into pro...
Claude Y. Laporte, Simon Alexandre, Rory O'Connor