Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 152 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
138
Voted
SPE
2011
186
views
Security Privacy
»
more
SPE 2011
»
Grammar-based test generation with YouGen
14 years 11 months ago
Download
webhome.csc.uvic.ca
Daniel Hoffman, David Ly-Gagnon, Paul A. Strooper,...
claim paper
Read More »
110
Voted
ISSE
2010
89
views
Security Privacy
»
more
ISSE 2010
»
Randomized constraint solvers: a comparative study
14 years 10 months ago
Download
www.cin.ufpe.br
Mitsuo Takaki, Diego Cavalcanti, Rohit Gheyi, Juli...
claim paper
Read More »
126
Voted
MOC
2010
117
views
Security Privacy
»
more
MOC 2010
»
Computing a lower bound for the canonical height on elliptic curves over number fields
14 years 10 months ago
Download
home.kku.ac.th
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug
claim paper
Read More »
107
Voted
SPIC
2010
88
views
Security Privacy
»
more
SPIC 2010
»
An attention controlled multi-core architecture for energy efficient object recognition
14 years 10 months ago
Download
ssl.kaist.ac.kr
Joo-Young Kim, Sejong Oh, Seungjin Lee, Minsu Kim,...
claim paper
Read More »
130
Voted
CCS
2011
ACM
195
views
Security Privacy
»
more
CCS 2011
»
iSpy: automatic reconstruction of typed input from compromising reflections
14 years 3 months ago
Download
cs.unc.edu
Rahul Raguram, Andrew M. White 0002, Dibyendusekha...
claim paper
Read More »
« Prev
« First
page 152 / 1024
Last »
Next »