Sciweavers

4835 search results - page 679 / 967
» Refactoring Functional Programs
Sort
View
CCS
2011
ACM
14 years 17 days ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
ICDCS
2011
IEEE
14 years 6 days ago
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
—Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desi...
Rui Zhang 0007, Yanchao Zhang
DAC
2012
ACM
13 years 3 months ago
Chisel: constructing hardware in a Scala embedded language
In this paper we introduce Chisel, a new hardware construction language that supports advanced hardware design using highly parameterized generators and layered domain-specific h...
Jonathan Bachrach, Huy Vo, Brian Richards, Yunsup ...
TKDE
2012
245views Formal Methods» more  TKDE 2012»
13 years 3 months ago
Semi-Supervised Maximum Margin Clustering with Pairwise Constraints
—The pairwise constraints specifying whether a pair of samples should be grouped together or not have been successfully incorporated into the conventional clustering methods such...
Hong Zeng, Yiu-ming Cheung
94
Voted
ICIP
2003
IEEE
16 years 2 months ago
Linear approximations for rate control in video coding
An efficient method for rate control is illustrated for joint source-channel rate selection and for encoding under multiple leaky bucket buffer constraints. This method shows adva...
Yegnaswamy Sermadevi, Sheila S. Hemami