Sciweavers

2055 search results - page 243 / 411
» Generic Model Refactorings
Sort
View
WSC
2008
15 years 5 months ago
Monotonicity and stratification
In utilizing the technique of stratification, the user needs to first partition/stratify the sample space; the next task is to determine how to allocate samples to strata. How to ...
Gang Zhao, Pirooz Vakili
APLAS
2008
ACM
15 years 5 months ago
Extensional Universal Types for Call-by-Value
Abstract. We propose c2-calculus, which is a second-order polymorphic call-by-value calculus with extensional universal types. Unlike product types or function types in call-by-val...
Kazuyuki Asada
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
15 years 4 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
MEDINFO
2007
139views Healthcare» more  MEDINFO 2007»
15 years 4 months ago
Lessons Learned from Cross-Validating Alignments between Large Anatomical Ontologies
Objectives: To compare the alignments of two large anatomical ontologies (the Foundational Model of Anatomy and GALEN) produced by three ontology alignment systems (AOAS, FALCON a...
Songmao Zhang, Olivier Bodenreider
SIMUTOOLS
2008
15 years 4 months ago
Increasing wireless revenue with service differentiation
New technologies such as IEEE 802.16 (Wi-MAX) [2] and IEEE 802.11e (Wi-Fi with QoS) [1] enable differentiated services. In this study we explore the potential for increasing the r...
Siamak Ayani, Jean C. Walrand