Sciweavers

4306 search results - page 728 / 862
» Timed Testing with TorX
Sort
View
ARC
2009
Springer
241views Hardware» more  ARC 2009»
15 years 4 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
ICCSA
2009
Springer
15 years 4 months ago
Learning and Predicting Key Web Navigation Patterns Using Bayesian Models
Abstract. The accurate prediction of Web navigation patterns has immense commercial value as the Web evolves into a primary medium for marketing and sales for many businesses. Ofte...
Malik Tahir Hassan, Khurum Nazir Junejo, Asim Kari...
ICLP
2009
Springer
15 years 4 months ago
An Engine for Computing Well-Founded Models
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Terrance Swift
LCTRTS
2009
Springer
15 years 4 months ago
Software transactional memory for multicore embedded systems
Embedded systems, like general-purpose systems, can benefit from parallel execution on a symmetric multicore platform. Unfortunately, concurrency issues present in general-purpos...
Jennifer Mankin, David R. Kaeli, John Ardini
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 4 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia