Sciweavers

1045 search results - page 35 / 209
» The Use of Exceptions
Sort
View
DSN
2007
IEEE
15 years 4 months ago
Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault Tolerance
A new approach is proposed that exploits repetition inherent in programs to provide low-overhead transient fault protection in a processor. Programs repeatedly execute the same in...
Vimal K. Reddy, Eric Rotenberg
KDD
1994
ACM
104views Data Mining» more  KDD 1994»
15 years 1 months ago
Comparing International Development Patterns Using Multi-Operator Learning and Discovery Tools
The multistrategy knowledge discovery tool, INLEN, is applied to databases consisting of economic and demographic facts and statistics about the countries of the world. Preliminar...
Kenneth A. Kaufman
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
15 years 1 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
IWFM
1998
14 years 11 months ago
Formal Engineering of the Bitonic Sort using PVS
In this paper, we present a proof that the bitonic sort is sound using PVS, a powerful specification and verification environment. First, we briefly introduce this well-known para...
Raphaël Couturier
WSC
1997
14 years 11 months ago
Simulation Using GPSS/H
GPSS/H is a tried-and-true simulation tool whose user base, both commercial and academic, continues to grow despite the presence of many “new” simulation technology trends. Th...
Robert C. Crain