Sciweavers

5344 search results - page 174 / 1069
» Privacy-Preserving Set Operations
Sort
View
146
Voted
EURODAC
1994
IEEE
148views VHDL» more  EURODAC 1994»
15 years 7 months ago
BiTeS: a BDD based test pattern generator for strong robust path delay faults
This paper presents an algorithm for generation of test patterns for strong robust path delay faults, i.e. tests that propagate the fault along a single path and additionally are ...
Rolf Drechsler
FCS
2006
15 years 4 months ago
Naming and its Regularities in Distributed Environments
: Many of the Internet's problems are related to names. There are many empirical ideas of the further development of naming on the Internet. However, there are no theoretical ...
Mark Burgin, Anshul Taldon
CORR
2008
Springer
87views Education» more  CORR 2008»
15 years 3 months ago
Two-Level Concept-Oriented Data Model
In this paper we describe a new approach to data modelling called the concept-oriented model (CoM). This model is based on the formalism of nested ordered sets which uses inclusion...
Alexandr A. Savinov
JAT
2006
69views more  JAT 2006»
15 years 3 months ago
Almost periodic Verblunsky coefficients and reproducing kernels on Riemann surfaces
We give an explicit parametrization of a set of almost periodic CMV matrices whose spectrum (is equal to the absolute continuous spectrum and) is a homogenous set E lying on the u...
Franz Peherstorfer, P. Yuditskii
FAST
2010
15 years 5 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...