Sciweavers

157 search results - page 21 / 32
» Presenting Proofs with Adapted Granularity
Sort
View
112
Voted
TSP
2008
144views more  TSP 2008»
15 years 1 months ago
A New Robust Variable Step-Size NLMS Algorithm
A new framework for designing robust adaptive filters is introduced. It is based on the optimization of a certain cost function subject to a time-dependent constraint on the norm o...
Leonardo Rey Vega, Hernan Rey, Jacob Benesty, Sara...
156
Voted
CORR
2009
Springer
242views Education» more  CORR 2009»
14 years 11 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...
EHCI
2004
15 years 3 months ago
Towards a New Generation of Widgets for Supporting Software Plasticity: The "Comet"
This paper addresses software adaptation to context of use. It goes one step further than our early work on plasticity [5]. Here, we propose a revision of the notion of software pl...
Gaëlle Calvary, Joëlle Coutaz, Olfa D&ac...
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
104
Voted
ACSAC
2001
IEEE
15 years 5 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner