Sciweavers

17770 search results - page 3467 / 3554
» A Generalization of Forward-Backward Algorithm
Sort
View
143
Voted
CCS
2008
ACM
15 years 4 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
143
Voted
ISSTA
2010
ACM
15 years 4 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su
104
Voted
IWMM
2010
Springer
211views Hardware» more  IWMM 2010»
15 years 4 months ago
Concurrent, parallel, real-time garbage-collection
With the current developments in CPU implementations, it becomes obvious that ever more parallel multicore systems will be used even in embedded controllers that require real-time...
Fridtjof Siebert
158
Voted
KDD
2010
ACM
323views Data Mining» more  KDD 2010»
15 years 4 months ago
TIARA: a visual exploratory text analytic system
In this paper, we present a novel exploratory visual analytic system called TIARA (Text Insight via Automated Responsive Analytics), which combines text analytics and interactive ...
Furu Wei, Shixia Liu, Yangqiu Song, Shimei Pan, Mi...
118
Voted
CGO
2008
IEEE
15 years 4 months ago
Comprehensive path-sensitive data-flow analysis
Data-flow analysis is an integral part of any aggressive optimizing compiler. We propose a framework for improving the precision of data-flow analysis in the presence of complex c...
Aditya V. Thakur, R. Govindarajan
« Prev « First page 3467 / 3554 Last » Next »