Sciweavers

288 search results - page 33 / 58
» The Theory and Practice of Adaptive Components
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 7 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
ICASSP
2008
IEEE
15 years 8 months ago
Compressive coded aperture superresolution image reconstruction
Recent work in the emerging field of compressive sensing indicates that, when feasible, judicious selection of the type of distortion induced by measurement systems may dramatica...
Roummel F. Marcia, Rebecca Willett
CORR
2000
Springer
96views Education» more  CORR 2000»
15 years 1 months ago
Robustness of Regional Matching Scheme over Global Matching Scheme
Analyzing the effect of concentrated noise on a typical decision-making process of a simplified two-candidate voting model, we have demonstrated that a local approach using a regi...
Liang Chen, Naoyuki Tokuda
UPP
2004
Springer
15 years 7 months ago
Grassroots Approach to Self-management in Large-Scale Distributed Systems
Abstract. Traditionally, autonomic computing is envisioned as replacing the human factor in the deployment, administration and maintenance of computer systems that are ever more co...
Özalp Babaoglu, Márk Jelasity, Alberto...
KBSE
1999
IEEE
15 years 6 months ago
Modular and Incremental Analysis of Concurrent Software Systems
Modularization and abstraction are the keys to practical verification and analysis of large and complex systems. We present in an incremental methodology for the automatic analysi...
Hassen Saïdi