Sciweavers

9842 search results - page 1632 / 1969
» Compositional timing analysis
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 8 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
GECCO
2006
Springer
144views Optimization» more  GECCO 2006»
15 years 8 months ago
Towards estimating nadir objective vector using evolutionary approaches
Nadir point plays an important role in multi-objective optimization because of its importance in estimating the range of objective values corresponding to desired Pareto-optimal s...
Kalyanmoy Deb, Shamik Chaudhuri, Kaisa Miettinen
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 8 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
ICSE
1998
IEEE-ACM
15 years 8 months ago
A Model of Noisy Software Engineering Data (Status Report)
other projects in the database. Software development data is highly variable, which often result,s in underlying trends being hidden. In order to address this problem, a method of ...
Roseanne Tesoriero, Marvin V. Zelkowitz
PAKDD
2000
ACM
140views Data Mining» more  PAKDD 2000»
15 years 8 months ago
Performance Controlled Data Reduction for Knowledge Discovery in Distributed Databases
The objective of data reduction is to obtain a compact representation of a large data set to facilitate repeated use of non-redundant information with complex and slow learning alg...
Slobodan Vucetic, Zoran Obradovic
« Prev « First page 1632 / 1969 Last » Next »