Sciweavers

314 search results - page 2 / 63
» Cubical token systems
Sort
View
SIGSOFT
2007
ACM
14 years 4 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
COLING
2010
12 years 10 months ago
Joint Tokenization and Translation
As tokenization is usually ambiguous for many natural languages such as Chinese and Korean, tokenization errors might potentially introduce translation mistakes for translation sy...
Xinyan Xiao, Yang Liu, Young-Sook Hwang, Qun Liu, ...
AMC
2008
168views more  AMC 2008»
13 years 2 months ago
A note on the local convergence of iterative methods based on Adomian decomposition method and 3-node quadrature rule
Darvishi and Barati [M.T. Darvishi, A. Barati, Super cubic iterative methods to solve systems of nonlinear equations,
D. K. R. Babajee, M. Z. Dauhoo, M. T. Darvishi, A....
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
14 years 4 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
AINA
2008
IEEE
13 years 10 months ago
Multi-Token Distributed Mutual Exclusion Algorithm
This paper is a contribution to the inception of multiple tokens in solving distributed mutual exclusion problem. The proposed algorithm is based on the token ring approach and al...
Md. Abdur Razzaque, Choong Seon Hong