Sciweavers

20197 search results - page 3547 / 4040
» Comparing Computational Power
Sort
View
KDD
2010
ACM
223views Data Mining» more  KDD 2010»
15 years 9 months ago
Frequent regular itemset mining
Concise representations of frequent itemsets sacrifice readability and direct interpretability by a data analyst of the concise patterns extracted. In this paper, we introduce an...
Salvatore Ruggieri
137
Voted
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
15 years 9 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
ESEM
2007
ACM
15 years 9 months ago
A Replicate Empirical Comparison between Pair Development and Software Development with Inspection
In 2005, we studied the development effort and effect of quality comparisons between software development with Fagan's inspection and pair development. Three experiments were...
Monvorath Phongpaibul, Barry W. Boehm
166
Voted
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
15 years 9 months ago
A GP neutral function for the artificial ANT problem
This paper introduces a function that increases the amount of neutrality (inactive code in Genetic Programming) for the Artificial Ant Problem. The objective of this approach is t...
Esteban Ricalde, Katya Rodríguez-Váz...
160
Voted
GLVLSI
2007
IEEE
166views VLSI» more  GLVLSI 2007»
15 years 9 months ago
Efficient pipelining for modular multiplication architectures in prime fields
This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation o...
Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid...
« Prev « First page 3547 / 4040 Last » Next »