Sciweavers

11231 search results - page 2208 / 2247
» Digging for Data Structures
Sort
View
APLAS
2010
ACM
14 years 11 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
ASUNAM
2010
IEEE
14 years 11 months ago
Product Adoption Networks and Their Growth in a Large Mobile Phone Network
—To understand the diffusive spreading of a product in a telecom network, whether the product is a service, handset, or subscription, it can be very useful to study the structure...
Pal Roe Sundsoy, Johannes Bjelland, Geoffrey Canri...
ISLPED
2010
ACM
202views Hardware» more  ISLPED 2010»
14 years 11 months ago
MODEST: a model for energy estimation under spatio-temporal variability
Estimation of static and dynamic energy of caches is critical for high-performance low-power designs. Commercial CAD tools performing energy estimation statically are not aware of...
Shrikanth Ganapathy, Ramon Canal, Antonio Gonz&aac...
RECSYS
2010
ACM
14 years 11 months ago
Collaborative filtering via euclidean embedding
Recommendation systems suggest items based on user preferences. Collaborative filtering is a popular approach in which recommending is based on the rating history of the system. O...
Mohammad Khoshneshin, W. Nick Street
DSD
2010
IEEE
144views Hardware» more  DSD 2010»
14 years 11 months ago
On-chip Scan-Based Test Strategy for a Dependable Many-Core Processor Using a NoC as a Test Access Mechanism
—Periodic on-chip scan-based tests have to be applied to a many-core processor SoC to improve its dependability. An infrastructural IP module has been designed and incorporated i...
Xiao Zhang, Hans G. Kerkhoff, Bart Vermeulen
« Prev « First page 2208 / 2247 Last » Next »