Sciweavers

1714 search results - page 257 / 343
» Abstract Models of Memory Management
Sort
View
158
Voted
IACR
2011
221views more  IACR 2011»
14 years 2 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
130
Voted
ISSTA
2006
ACM
15 years 8 months ago
Test input generation for java containers using state matching
The popularity of object-oriented programming has led to the wide use of container libraries. It is important for the reliability of these containers that they are tested adequate...
Willem Visser, Corina S. Pasareanu, Radek Pel&aacu...
IEEEPACT
2008
IEEE
15 years 9 months ago
Leveraging on-chip networks for data cache migration in chip multiprocessors
Recently, chip multiprocessors (CMPs) have arisen as the de facto design for modern high-performance processors, with increasing core counts. An important property of CMPs is that...
Noel Eisley, Li-Shiuan Peh, Li Shang
106
Voted
ISCI
2007
115views more  ISCI 2007»
15 years 2 months ago
Compressed histograms with arbitrary bucket layouts for selectivity estimation
Selectivity estimation is an important step of query optimization in a database management system, and multidimensional histogram techniques have proved promising for selectivity ...
Dennis Fuchs, Zhen He, Byung Suk Lee
130
Voted
CIARP
2007
Springer
15 years 9 months ago
Dynamic Penalty Based GA for Inducing Fuzzy Inference Systems
Abstract. Fuzzy based models have been used in many areas of research. One issue with these models is that rule bases have the potential for indiscriminant growth. Inference system...
Tomás Arredondo Vidal, Félix V&aacut...