Sciweavers

5119 search results - page 152 / 1024
» Security Privacy
Sort
View
138
Voted
SPE
2011
14 years 11 months ago
Grammar-based test generation with YouGen
Daniel Hoffman, David Ly-Gagnon, Paul A. Strooper,...
110
Voted
ISSE
2010
14 years 10 months ago
Randomized constraint solvers: a comparative study
Mitsuo Takaki, Diego Cavalcanti, Rohit Gheyi, Juli...
126
Voted
MOC
2010
14 years 10 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug
107
Voted
SPIC
2010
14 years 10 months ago
An attention controlled multi-core architecture for energy efficient object recognition
Joo-Young Kim, Sejong Oh, Seungjin Lee, Minsu Kim,...
130
Voted
CCS
2011
ACM
14 years 3 months ago
iSpy: automatic reconstruction of typed input from compromising reflections
Rahul Raguram, Andrew M. White 0002, Dibyendusekha...