Sciweavers

17409 search results - page 3234 / 3482
» The Design and Performance of MedJava
Sort
View
FPL
2008
Springer
178views Hardware» more  FPL 2008»
15 years 6 months ago
High-speed regular expression matching engine using multi-character NFA
An approach is presented for high throughput matching of regular expressions (regexes) by first converting them into corresponding Non-deterministic Finite Automata (NFAs) which a...
Norio Yamagaki, Reetinder P. S. Sidhu, Satoshi Kam...
156
Voted
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
15 years 6 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
AAAI
2010
15 years 6 months ago
SAP Speaks PDDL
In several application areas for Planning, in particular helping with the creation of new processes in Business Process Management (BPM), a major obstacle lies in the modeling. Ob...
Jörg Hoffmann, Ingo Weber, Frank Michael Kraf...
AAAI
2010
15 years 6 months ago
Efficient Spectral Feature Selection with Minimum Redundancy
Spectral feature selection identifies relevant features by measuring their capability of preserving sample similarity. It provides a powerful framework for both supervised and uns...
Zheng Zhao, Lei Wang, Huan Liu
BCS
2008
15 years 6 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
« Prev « First page 3234 / 3482 Last » Next »