Sciweavers

2797 search results - page 67 / 560
» Code query by example
Sort
View
CORR
2010
Springer
111views Education» more  CORR 2010»
14 years 12 months ago
Error Exponent for Multiple-Access Channels:Lower Bounds
A unified framework to obtain all known lower bounds (random coding, typical random coding and expurgated bound) on the reliability function of a point-to-point discrete memoryles...
Ali Nazari, Achilleas Anastasopoulos, S. Sandeep P...
SIGMOD
2004
ACM
148views Database» more  SIGMOD 2004»
16 years 2 months ago
Vertical and Horizontal Percentage Aggregations
Existing SQL aggregate functions present important limitations to compute percentages. This article proposes two SQL aggregate functions to compute percentages addressing such lim...
Carlos Ordonez
DEXA
1994
Springer
81views Database» more  DEXA 1994»
15 years 6 months ago
Supporting Information Disclosure in an Evolving Environment
Even if high-level query languages are used, query formulation may cause problems. This is notably so in case of large and complex application domains. Typical examples of these ki...
Arthur H. M. ter Hofstede, Henderik Alex Proper, T...
EUROCRYPT
2007
Springer
15 years 8 months ago
Cryptanalysis of the Sidelnikov Cryptosystem
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effecti...
Lorenz Minder, Amin Shokrollahi
ICSM
2008
IEEE
15 years 9 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...