Sciweavers

3864 search results - page 38 / 773
» time 2005
Sort
View
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 3 months ago
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
The standard class of adversaries considered in cryptography is that of strict polynomial-time probabilistic machines. However, expected polynomial-time machines are often also co...
Jonathan Katz, Yehuda Lindell
EUC
2005
Springer
15 years 3 months ago
Wireless RFID Networks for Real-Time Customer Relationship Management
A new system for real-time customer relationship management is proposed. The system is based on deploying a network of RFID readers throughout an environment. Information about the...
C. Philipp Schloter, Hamid K. Aghajan
CORR
2007
Springer
102views Education» more  CORR 2007»
14 years 9 months ago
Time Series Forecasting: Obtaining Long Term Trends with Self-Organizing Maps
Kohonen self-organisation maps are a well know classification tool, commonly used in a wide variety of problems, but with limited applications in time series forecasting context....
Geoffroy Simon, Amaury Lendasse, Marie Cottrell, J...
FM
2005
Springer
88views Formal Methods» more  FM 2005»
15 years 3 months ago
Timing Tolerances in Safety-Critical Software
Many safety-critical software applications are hard real-time systems. They have stringent timing requirements that have to be met. We present a description of timing behaviour tha...
Alan Wassyng, Mark Lawford, Xiayong Hu
DAC
2005
ACM
15 years 10 months ago
Leakage efficient chip-level dual-Vdd assignment with time slack allocation for FPGA power reduction
To reduce power, Vdd programmability has been proposed recently to select Vdd-level for interconnects and to powergate unused interconnects. However, Vdd-level converters used in ...
Yan Lin, Lei He