Sciweavers

667 search results - page 72 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ICCAD
2002
IEEE
124views Hardware» more  ICCAD 2002»
15 years 8 months ago
Symbolic pointer analysis
— One of the bottlenecks in the recent movement of hardware synthesis from behavioral C programs is the difficulty in reasoning about runtime pointer values at compile time. The...
Jianwen Zhu
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
15 years 6 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 5 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
BMCBI
2005
94views more  BMCBI 2005»
14 years 11 months ago
Visualization-based discovery and analysis of genomic aberrations in microarray data
Background: Chromosomal copy number changes (aneuploidies) play a key role in cancer progression and molecular evolution. These copy number changes can be studied using microarray...
Chad L. Myers, Xing Chen, Olga G. Troyanskaya
SRDS
1999
IEEE
15 years 4 months ago
Formal Hazard Analysis of Hybrid Systems in cTLA
Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard ...
Peter Herrmann, Heiko Krumm