Sciweavers

5122 search results - page 265 / 1025
» Comparing Consequence Relations
Sort
View
FPL
2005
Springer
114views Hardware» more  FPL 2005»
15 years 10 months ago
Measuring and Utilizing the Correlation Between Signal Connectivity and Signal Positioning for FPGAs Containing Multi-Bit Buildi
As the logic capacity of FPGA increases, there has been a corresponding increase in the variety of FPGA building blocks. From a mere collection of the conventional logic blocks, F...
Andy Gean Ye, Jonathan Rose
KDD
2005
ACM
163views Data Mining» more  KDD 2005»
15 years 10 months ago
Web mining from competitors' websites
This paper presents a framework for user-oriented text mining. It is then illustrated with an example of discovering knowledge from competitors’ websites. The knowledge to be di...
Xin Chen, Yi-fang Brook Wu
MOBICOM
2004
ACM
15 years 10 months ago
Modeling mobility for vehicular ad-hoc networks
Without realistic modeling of node mobility, simulation evaluation of performance of mobile ad hoc networks may not correlate well with performance in a real deployment. In this p...
Amit Kumar Saha, David B. Johnson
ASIACRYPT
2004
Springer
15 years 10 months ago
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
We study the class of masking based domain extenders for UOWHFs. Our first contribution is to show that any correct masking based domain extender for UOWHF which invokes the compr...
Palash Sarkar
CEAS
2004
Springer
15 years 10 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li