Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries agains...
Violations of a number of common safety properties of multithreaded programs–such as atomicity and absence of dataraces–cannot be observed by looking at the linear execution t...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
In this work MagnetoEncephaloGram (MEG) recordings of epileptic patients were analyzed using a hybrid neural networks training algorithm. This algorithm combines genetic algorithm...
Adam V. Adamopoulos, Efstratios F. Georgopoulos, S...
Classification is one of the most fundamental problems in machine learning, which aims to separate the data from different classes as far away as possible. A common way to get a g...
Bin Zhang, Fei Wang, Ta-Hsin Li, Wen Jun Yin, Jin ...
Application Service Maintenance(ASM) projects mainly use Activity-Based software estimation methodology compared to Function Point or Lines of Code Estimation methodologies[1]. Th...