Sciweavers

1458 search results - page 85 / 292
» The sequentially realizable functionals
Sort
View
DATE
2007
IEEE
112views Hardware» more  DATE 2007»
15 years 10 months ago
Compact hardware design of Whirlpool hashing core
Weaknesses have recently been found in the widely used cryptographic hash functions SHA-1 and MD5. A potential alternative for these algorithms is the Whirlpool hash function, whi...
Timo Alho, Panu Hämäläinen, Marko H...
106
Voted
CDC
2009
IEEE
150views Control Systems» more  CDC 2009»
15 years 8 months ago
Cooperative adaptive sampling via approximate entropy maximization
— This work deals with a group of mobile sensors sampling a spatiotemporal random field whose mean is unknown and covariance is known up to a scaling parameter. The Bayesian pos...
Rishi Graham, Jorge Cortés
153
Voted
ICTAI
1997
IEEE
15 years 7 months ago
Exploiting Symbolic Techniques within Genetic Algorithms for Power Optimization
This paper proposes an optimization algorithm for reducing the power dissipation in a sequential circuit. The encoding of the different states in a Finite State Machine is modifie...
S. Chuisano, Fulvio Corno, Paolo Prinetto, Maurizi...
106
Voted
CONCUR
2010
Springer
15 years 4 months ago
Termination in Impure Concurrent Languages
Abstract. An impure language is one that combines functional and imperative constructs. We propose a method for ensuring termination of impure concurrent languages that makes it po...
Romain Demangeon, Daniel Hirschkoff, Davide Sangio...
86
Voted
RE
2005
Springer
15 years 9 months ago
ST-Tool: A CASE Tool for Security Requirements Engineering
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...