Sciweavers

2680 search results - page 255 / 536
» The topology of the independence complex
Sort
View
HT
2003
ACM
15 years 7 months ago
Browsing intricately interconnected paths
Graph-centric and node-centric browsing are the two commonly identified hypertext-browsing paradigms. We believe that pathcentric browsing, the browsing behavior exhibited by path...
Pratik Dave, Unmil Karadkar, Richard Furuta, Luis ...
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
15 years 6 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
IPPS
1997
IEEE
15 years 5 months ago
Semantics and Implementation of a Generalized forall Statement for Parallel Languages
In this paper we present a generalized forall statement for parallel languages. The forall statement occurs in many (data) parallel languages and specifies which computations can...
Paul Dechering, Leo C. Breebaart, Frits Kuijlman, ...
ICRE
1996
IEEE
15 years 5 months ago
A facilitator method for upstream design activities with diverse stakeholders
This paper presents a method that can be used for the elicitation and speci cation of requirements and high-level design. It supports stakeholder-based modeling, rapid feasibility...
Regina M. Gonzales, Alexander L. Wolf
DSD
2009
IEEE
160views Hardware» more  DSD 2009»
15 years 5 months ago
Conservative Dynamic Energy Management for Real-Time Dataflow Applications Mapped on Multiple Processors
Voltage-frequency scaling (VFS) trades a linear processor slowdown for a potentially quadratic reduction in energy consumption. Complex dependencies may exist between different tas...
Anca Mariana Molnos, Kees Goossens