Sciweavers

13500 search results - page 2553 / 2700
» Improved analysis of D
Sort
View
82
Voted
SAC
2009
ACM
15 years 3 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
ICS
2001
Tsinghua U.
15 years 3 months ago
Global optimization techniques for automatic parallelization of hybrid applications
This paper presents a novel technique to perform global optimization of communication and preprocessing calls in the presence of array accesses with arbitrary subscripts. Our sche...
Dhruva R. Chakrabarti, Prithviraj Banerjee
83
Voted
WIA
2001
Springer
15 years 3 months ago
Finite-State Transducer Cascade to Extract Proper Names in Texts
This article describes a finite-state cascade for the extraction of person names in texts in French. We extract these proper names in order to categorize and to cluster texts with...
Nathalie Friburger, Denis Maurel
89
Voted
ECAL
1999
Springer
15 years 3 months ago
A Generic Neutral Model for Quantitative Comparison of Genotypic Evolutionary Activity
We use a new general-purpose model of neutral evolution of genotypes to make quantitative comparisons of diversity and adaptive evolutionary activity as a function of mutation rate...
Andreas Rechtsteiner, Mark A. Bedau
77
Voted
ESA
1999
Springer
105views Algorithms» more  ESA 1999»
15 years 3 months ago
Provably Good and Practical Strategies for Non-Uniform Data Management in Networks
This paper deals with the on-line allocation of shared data objects to the local memory modules of the nodes in a network. We assume that the data is organized in indivisible objec...
Friedhelm Meyer auf der Heide, Berthold Vöcki...
« Prev « First page 2553 / 2700 Last » Next »