Sciweavers

3825 search results - page 645 / 765
» Selective Value Prediction
Sort
View
ISQED
2002
IEEE
203views Hardware» more  ISQED 2002»
15 years 9 months ago
Automatic Test Program Generation from RT-Level Microprocessor Descriptions
The paper addresses the issue of microprocessor and microcontroller testing, and follows an approach based on the generation of a test program. The proposed method relies on two p...
Fulvio Corno, Gianluca Cumani, Matteo Sonza Reorda...
SIGMOD
2010
ACM
171views Database» more  SIGMOD 2010»
15 years 9 months ago
Variance aware optimization of parameterized queries
Parameterized queries are commonly used in database applications. In a parameterized query, the same SQL statement is potentially executed multiple times with different parameter ...
Surajit Chaudhuri, Hongrae Lee, Vivek R. Narasayya
AI
2010
Springer
15 years 9 months ago
A Three-Way Decision Approach to Email Spam Filtering
Many classification techniques used for identifying spam emails, treat spam filtering as a binary classification problem. That is, the incoming email is either spam or non-spam....
Bing Zhou, Yiyu Yao, Jigang Luo
128
Voted
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
15 years 9 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
CSE
2009
IEEE
15 years 9 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu