Sciweavers

1419 search results - page 101 / 284
» Analysis of Summarization Evaluation Experiments
Sort
View
SIGACT
2010
68views more  SIGACT 2010»
14 years 4 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser
EXPCS
2007
15 years 1 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...
ENASE
2011
219views Hardware» more  ENASE 2011»
13 years 9 months ago
Mutation Selection: Some Could be Better than All
In previous research, many mutation selection techniques have been proposed to reduce the cost of mutation analysis. After a mutant subset is selected, researchers could obtain a t...
Zhiyi Zhang, Dongjiang You, Zhenyu Chen, Yuming Zh...
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
15 years 2 months ago
On the Complexity of Matsui's Attack
Linear cryptanalysis remains the most powerful attack against DES at this time. Given 243 known plaintext-ciphertext pairs, Matsui expected a complexity of less than 243 DES evalua...
Pascal Junod
ECRTS
2006
IEEE
15 years 4 months ago
Timing Analysis of the FlexRay Communication Protocol
FlexRay will very likely become the de-facto standard for in-vehicle communications. However, before it can be successfully used for safety-critical applications that require pred...
Traian Pop, Paul Pop, Petru Eles, Zebo Peng, Alexa...