Sciweavers

7393 search results - page 1107 / 1479
» Synthesis-for-testability using transformations
Sort
View
156
Voted
DAWAK
2005
Springer
15 years 10 months ago
Optimizing a Sequence of Frequent Pattern Queries
Discovery of frequent patterns is a very important data mining problem with numerous applications. Frequent pattern mining is often regarded as advanced querying where a user speci...
Mikolaj Morzy, Marek Wojciechowski, Maciej Zakrzew...
ESOP
2005
Springer
15 years 10 months ago
A New Foundation for Control-Dependence and Slicing for Modern Program Structures
The notion of control dependence underlies many program analysis and transformation techniques used in numerous applications. Despite wide application, existing definitions and ap...
Venkatesh Prasad Ranganath, Torben Amtoft, Anindya...
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 10 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
149
Voted
ICCS
2005
Springer
15 years 10 months ago
Performance and Scalability Analysis of Cray X1 Vectorization and Multistreaming Optimization
Cray X1 Fortran and C/C++ compilers provide a number of loop transformations, notably vectorization and multistreaming, in order to exploit the multistreaming processor (MSP) hard...
Sadaf R. Alam, Jeffrey S. Vetter
127
Voted
ICFEM
2005
Springer
15 years 10 months ago
Visualizing and Simulating Semantic Web Services Ontologies
The development of Web Services has transformed the World Wide Web into a more application-aware information portal. The various standards ensure that Web Services are interpretabl...
Jun Sun 0001, Yuan-Fang Li, Hai H. Wang, Jing Sun
« Prev « First page 1107 / 1479 Last » Next »