Sciweavers

15253 search results - page 2833 / 3051
» Integer-Programming Software Systems
Sort
View
143
Voted
DAC
2008
ACM
15 years 5 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
117
Voted
DAS
2008
Springer
15 years 5 months ago
An Empirical Measure on the Set of Symbols Occurring in Engineering Mathematics Texts
Certain forms of mathematical expression are used more often than others in practice. A quantitative understanding of actual usage can provide additional information to improve th...
Stephen M. Watt
DASFAA
2008
IEEE
137views Database» more  DASFAA 2008»
15 years 5 months ago
Efficient Mining of Recurrent Rules from a Sequence Database
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
David Lo, Siau-Cheng Khoo, Chao Liu 0001
DAWAK
2008
Springer
15 years 5 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
152
Voted
DSVIS
2008
Springer
15 years 5 months ago
Towards a Library of Workflow User Interface Patterns
Abstract. A collection of user interface design patterns for workflow information systems is presented. Each Workflow User Interface Pattern (WUIP) is characterized by properties e...
Josefina Guerrero García, Jean Vanderdonckt...
« Prev « First page 2833 / 3051 Last » Next »