Sciweavers

438 search results - page 60 / 88
» date 2009
Sort
View
105
Voted
SACRYPT
2009
Springer
212views Cryptology» more  SACRYPT 2009»
15 years 4 months ago
Compact McEliece Keys from Goppa Codes
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains secure to this date in contrast to many other families of codes but leads to very large pu...
Rafael Misoczki, Paulo S. L. M. Barreto
CHI
2009
ACM
15 years 2 months ago
Contemporary domestic infrastructures and technology design
In this proposal, I describe my examination of two contemporary domestic infrastructures. Specifically, I am investigating whether we need to surface more information about these ...
Marshini Chetty
DAC
2009
ACM
15 years 2 months ago
Exploiting "architecture for verification" to streamline the verification process
A typical hardware development flow starts the verification process concurrently with RTL, but the overall schedule becomes limited by the effort required to complete all the nece...
Dave Whipp
90
Voted
CAISE
2009
Springer
15 years 2 months ago
Goal-Directed Modeling of Self-adaptive Software Architecture
Abstract. Today’s large-scale computing systems are deployed in open, changing and unpredictable environments. To operate reliably, such systems should be able to adapt to new ci...
Shan Tang, Xin Peng, Yijun Yu, Wenyun Zhao
85
Voted
OTM
2009
Springer
15 years 2 months ago
Automatic Construction of a Semantic, Domain-Independent Knowledge Base
In this paper, we want to show which difficulties arise when automatically constructing a domain-independent knowledge base from the web. We show possible applications for such a k...
David Urbansky