Sciweavers

2297 search results - page 133 / 460
» A fast APRIORI implementation
Sort
View
CAV
2004
Springer
108views Hardware» more  CAV 2004»
15 years 4 months ago
DPLL( T): Fast Decision Procedures
The logic of equality with uninterpreted functions (EUF) and its extensions have been widely applied to processor verification, by means of a large variety of progressively more s...
Harald Ganzinger, George Hagen, Robert Nieuwenhuis...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 4 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
ICMI
2003
Springer
131views Biometrics» more  ICMI 2003»
15 years 4 months ago
A system for fast, full-text entry for small electronic devices
A novel text entry system designed based on the ubiquitous 12button telephone keypad and its adaptation for a soft keypad are presented. This system can be used to enter full text...
Saied Bozorgui-Nesbat
INFOCOM
2002
IEEE
15 years 4 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
PAKDD
2010
ACM
212views Data Mining» more  PAKDD 2010»
15 years 3 months ago
Fast Perceptron Decision Tree Learning from Evolving Data Streams
Abstract. Mining of data streams must balance three evaluation dimensions: accuracy, time and memory. Excellent accuracy on data streams has been obtained with Naive Bayes Hoeffdi...
Albert Bifet, Geoffrey Holmes, Bernhard Pfahringer...