Sciweavers

2539 search results - page 307 / 508
» Debugging Method Names
Sort
View
141
Voted
ICADL
2003
Springer
145views Education» more  ICADL 2003»
15 years 7 months ago
Towards Web Mining of Query Translations for Cross-Language Information Retrieval in Digital Libraries
This paper proposes an efficient client-server-based query translation approach to allowing more feasible implementation of cross-language information retrieval (CLIR) services in ...
Wen-Hsiang Lu, Jenq-Haur Wang, Lee-Feng Chien
DATE
2002
IEEE
153views Hardware» more  DATE 2002»
15 years 7 months ago
Low Power Embedded Software Optimization Using Symbolic Algebra
The market demand for portable multimedia applications has exploded in the recent years. Unfortunately, for such applications current compilers and software optimization methods o...
Armita Peymandoust, Tajana Simunic, Giovanni De Mi...
ISQED
2002
IEEE
203views Hardware» more  ISQED 2002»
15 years 7 months ago
Automatic Test Program Generation from RT-Level Microprocessor Descriptions
The paper addresses the issue of microprocessor and microcontroller testing, and follows an approach based on the generation of a test program. The proposed method relies on two p...
Fulvio Corno, Gianluca Cumani, Matteo Sonza Reorda...
SIGECOM
2010
ACM
137views ECommerce» more  SIGECOM 2010»
15 years 7 months ago
Prediction without markets
Citing recent successes in forecasting elections, movies, products, and other outcomes, prediction market advocates call for widespread use of market-based methods for government ...
Sharad Goel, Daniel M. Reeves, Duncan J. Watts, Da...
98
Voted
CSFW
2000
IEEE
15 years 7 months ago
Protocol Independence through Disjoint Encryption
One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a securi...
Joshua D. Guttman, F. Javier Thayer