Sciweavers

99 search results - page 9 / 10
» Properties of the Realization of Inner Functions
Sort
View
109 views 122 votes 15 years 1 months ago  CORR 2010»
The efficient realization of linear space-variant (non-convolution) filters is a challenging computational problem in image processing. In this paper, we demonstrate that it is po...
92 views 113 votes 15 years 1 months ago  SIAMJO 2002»
We study a class of generalized bundle methods for which the stabilizing term can be any closed convex function satisfying certain properties. This setting covers several algorithm...
104 views 101 votes 15 years 6 months ago  GROUP 2003»
Reconciliating divergent data is an important issue in concurrent engineering, mobile computing and software configuration management. Currently, a lot of synchronizers or merge ...
168 views 110 votes 15 years 5 months ago  FDL 2004»
Model-driven approaches proved themselves not suited yet to support real-time software development. Even if they have the ability of capturing adequately both functional and non-f...
139 views 97 votes 15 years 10 months ago  ICCAD 2007»
— We introduce a remote activation scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock eac...
92 views 84 votes 15 years 5 months ago  CAV 1999»
The theory of latency insensitive design is presented as the foundation of a new correct by construction methodology to design very large digital systems by assembling blocks of In...
118 views 127 votes 14 years 8 months ago  JMLR 2010»
A Hilbert space embedding for probability measures has recently been proposed, with applications including dimensionality reduction, homogeneity testing, and independence testing....
220 views 118 votes 16 years 2 months ago  WWW 2009»
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
189 views 175 votes 14 years 5 months ago  CTRSA 2011»
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
122 views 97 votes 15 years 6 months ago  EUROPAR 2004»
The parallel realization of adaptive finite element methods (FEM) has to deal with several irregular and dynamic algorithmic properties caused by adaptive mesh refinement (AMR). ...