Sciweavers

860 search results - page 99 / 172
» Japanese Case Structure Analysis
Sort
View
PLDI
2011
ACM
14 years 7 months ago
The tao of parallelism in algorithms
For more than thirty years, the parallel programming community has used the dependence graph as the main abstraction for reasoning about and exploiting parallelism in ā€œregularā€...
Keshav Pingali, Donald Nguyen, Milind Kulkarni, Ma...
ICDAR
2009
IEEE
15 years 11 months ago
A Survey of Techniques for Document and Archaeology Artefact Reconstruction
An automated assembling of shredded/torn documents (2D) or broken pottery (3D) will support philologists, archaeologists and forensic experts. An automated solution for this task ...
Florian Kleber, Robert Sablatnig
PASTE
2010
ACM
15 years 9 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
15 years 8 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
ENDM
2000
174views more  ENDM 2000»
15 years 4 months ago
Hybrid Constraints in Automated Model Synthesis and Model Processing
Both parametric design tasks and analysis tasks of technical systems have a similar problem setting: The structure of the system to be configured or analyzed is defined already. W...
Klaus-Ulrich Leweling, Benno Stein