Sciweavers

43264 search results - page 8379 / 8653
» Comparing models of computation
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 3 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
ITC
1998
IEEE
120views Hardware» more  ITC 1998»
15 years 3 months ago
Test generation in VLSI circuits for crosstalk noise
This paper addresses the problem of efficiently and accurately generating two-vector tests for crosstalk induced effects, such as pulses, signal speedup and slowdown, in digital c...
Weiyu Chen, Sandeep K. Gupta, Melvin A. Breuer
98
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 3 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CPE
1998
Springer
115views Hardware» more  CPE 1998»
15 years 3 months ago
On Choosing a Task Assignment Policy for a Distributed Server System
We consider a distributed server system model and ask which policy should be used for assigning tasks to hosts. In our model each host processes tasks in First-Come-First-Serve ord...
Mor Harchol-Balter, Mark Crovella, Cristina D. Mur...
ISAAC
1998
Springer
99views Algorithms» more  ISAAC 1998»
15 years 3 months ago
On the Multiple Gene Duplication Problem
Abstract. A fundamental problem in computational biology is the determination of the correct species tree for a set of taxa given a set of possibly contradictory gene trees. In rec...
Michael R. Fellows, Michael T. Hallett, Ulrike Ste...
« Prev « First page 8379 / 8653 Last » Next »