Sciweavers

6253 search results - page 408 / 1251
» Use Case Modeling Guidelines
Sort
View
TIT
2008
111views more  TIT 2008»
15 years 4 months ago
The Bounded-Storage Model in the Presence of a Quantum Adversary
An extractor is a function that is used to extract randomness. Given an imperfect random source X and a uniform seed Y , the output (X; Y ) is close to uniform. We study properties...
Robert T. König, Barbara M. Terhal
JNS
2007
85views more  JNS 2007»
15 years 4 months ago
Long-Time Accuracy for Approximate Slow Manifolds in a Finite-Dimensional Model of Balance
We study the slow singular limit for planar anharmonic oscillatory motion of a charged particle under the influence of a perpendicular magnetic field when the mass of the particl...
G. Gottwald, M. Oliver, N. Tecu
142
Voted
INFORMATICALT
1998
89views more  INFORMATICALT 1998»
15 years 4 months ago
A Mathematical Analysis of an Age-sex-space-structured Population Dynamics Model with Random Mating and Females' Pregnancy
We discuss an age-sex-structured population dynamics deterministic model taking into account random mating of sexes, females’ pregnancy and its dispersal in whole space. This mod...
Vladas Skakauskas
156
Voted
ERSA
2009
107views Hardware» more  ERSA 2009»
15 years 2 months ago
Towards Effective Modeling and Programming Multi-core Tiled Reconfigurable Architectures
For a generic flexible efficient array antenna receiver platform a hierarchical reconfigurable tiled architecture has been proposed. The architecture provides a flexible reconfigur...
Kenneth C. Rovers, Marcel D. van de Burgwal, Jan K...
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 11 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh