Sciweavers

3639 search results - page 701 / 728
» Provenance as Dependency Analysis
Sort
View
WSC
2000
14 years 11 months ago
Developing a national allocation model for cadaveric kidneys
The UNOS Kidney Allocation Model (UKAM) is a software tool for the simulation and analysis of national cadaveric kidney and kidney-pancreas allocation policies for transplantation...
Sarah E. Taranto, Ann M. Harper, Erick B. Edwards,...
LISA
1993
14 years 11 months ago
Forecasting Disk Resource Requirements for a Usenet Server
Three years ago the Stanford Linear Accelerator Center (SLAC) decided to embrace netnews as a site-wide, multi-platform communications tool for the laboratory’s diverse user com...
Karl L. Swartz
ASUNAM
2010
IEEE
14 years 10 months ago
Product Adoption Networks and Their Growth in a Large Mobile Phone Network
—To understand the diffusive spreading of a product in a telecom network, whether the product is a service, handset, or subscription, it can be very useful to study the structure...
Pal Roe Sundsoy, Johannes Bjelland, Geoffrey Canri...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
14 years 9 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
ISSTA
2010
ACM
14 years 9 months ago
Automatically identifying critical input regions and code in applications
Applications that process complex inputs often react in different ways to changes in different regions of the input. Small changes to forgiving regions induce correspondingly smal...
Michael Carbin, Martin C. Rinard