Sciweavers

4306 search results - page 728 / 862
» Timed Testing with TorX
Sort
View
ARC
2009
Springer
241views Hardware» more  ARC 2009»
15 years 10 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
ICCSA
2009
Springer
15 years 10 months ago
Learning and Predicting Key Web Navigation Patterns Using Bayesian Models
Abstract. The accurate prediction of Web navigation patterns has immense commercial value as the Web evolves into a primary medium for marketing and sales for many businesses. Ofte...
Malik Tahir Hassan, Khurum Nazir Junejo, Asim Kari...
ICLP
2009
Springer
15 years 10 months ago
An Engine for Computing Well-Founded Models
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Terrance Swift
LCTRTS
2009
Springer
15 years 10 months ago
Software transactional memory for multicore embedded systems
Embedded systems, like general-purpose systems, can benefit from parallel execution on a symmetric multicore platform. Unfortunately, concurrency issues present in general-purpos...
Jennifer Mankin, David R. Kaeli, John Ardini
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 10 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia