Sciweavers

342 search results - page 39 / 69
» Reuse, Standardization, and Transformation of Requirements
Sort
View
TIT
2011
125views more  TIT 2011»
14 years 4 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
14 years 8 months ago
Heterogeneous vs homogeneous MPSoC approaches for a Mobile LTE modem
— Applications like 4G baseband modem require single-chip implementation to meet the integration and power consumption requirements. These applications demand a high computing pe...
Camille Jalier, Didier Lattard, Ahmed Amine Jerray...
CIKM
2010
Springer
14 years 8 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...
CAV
2011
Springer
202views Hardware» more  CAV 2011»
14 years 1 months ago
Simplifying Loop Invariant Generation Using Splitter Predicates
Abstract. We present a novel static analysis technique that substantially improves the quality of invariants inferred by standard loop invariant generation techniques. Our techniqu...
Rahul Sharma 0001, Isil Dillig, Thomas Dillig, Ale...
TSP
2008
180views more  TSP 2008»
14 years 9 months ago
Algebraic Signal Processing Theory: Foundation and 1-D Time
This paper introduces a general and axiomatic approach to linear signal processing (SP) that we refer to as the algebraic signal processing theory (ASP). Basic to ASP is the linear...
Markus Püschel, José M. F. Moura