Sciweavers

7225 search results - page 1229 / 1445
» On the Computational Power of Biochemistry
Sort
View
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
14 years 11 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
143
Voted
IALP
2009
14 years 11 months ago
Improved Reordering Rules for Hierarchical Phrase-Based Translation
Hierarchical phrase-based translation model has been proven to be a simple and powerful machine translation model. However, due to the computational complexity constraints, the ext...
Shu Cai, Yajuan Lü, Qun Liu
145
Voted
ICMLA
2009
14 years 11 months ago
Alive on Back-feed Culprit Identification via Machine Learning
We describe an application of machine learning techniques toward the problem of predicting which network protector switch is the cause of an Alive on Back-Feed (ABF) event in the ...
Bert C. Huang, Ansaf Salleb-Aouissi, Philip Gross
105
Voted
ICSE
2009
IEEE-ACM
14 years 11 months ago
Architecting Robustness and Timeliness in a New Generation of Aerospace Systems
Aerospace systems have strict dependability and real-time requirements, as well as a need for flexible resource reallocation and reduced size, weight and power consumption. To cope...
José Rufino, João Craveiro, Paulo Ve...
DEBU
2010
173views more  DEBU 2010»
14 years 11 months ago
uFLIP: Understanding the Energy Consumption of Flash Devices
Understanding the energy consumption of flash devices is important for two reasons. First, energy is emerging as a key metric for data management systems. It is thus important to ...
Matias Bjørling, Philippe Bonnet, Luc Bouga...
« Prev « First page 1229 / 1445 Last » Next »