Sciweavers

67 search results - page 10 / 14
» Y2K and Believing in Software Practice
Sort
View
SUTC
2010
IEEE
15 years 1 months ago
Pushing the Throughput Limit of Low-Complexity Wireless Embedded Sensing Systems
—To maximize the communication throughput for wireless sensing systems, designers have attempted various combinations of protocol design and manual code optimization. Although th...
Vahid Salmani, Pai H. Chou
ASIACRYPT
2009
Springer
15 years 25 days ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 1 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
CLEIEJ
2008
97views more  CLEIEJ 2008»
14 years 9 months ago
A finite bidimensional wavelet framework for computer graphics: Image equalization
A lot of material has been written about wavelet theory. Most of these texts provide an elegant framework from the functional and real analysis point of view. The complete infinit...
Francisco Jose Benavides Murillo, Edgar Benavides ...
SOFTWARE
2002
14 years 9 months ago
Failure or Success?
The body of literature on SMEs suggest that all SMEs seem to go through different life cycles, and while the terms used by different authors may vary, the events that govern them ...