Sciweavers

503 search results - page 43 / 101
» Using The Same System For Analyzing And Synthesizing Sentenc...
Sort
View
FCCM
2002
IEEE
109views VLSI» more  FCCM 2002»
15 years 2 months ago
Compiling ATR Probing Codes for Execution on FPGA Hardware
This paper describes the implementation of an automatic target recognition ATR Probing algorithm on a recon gurable system, using the SA-C programming language and optimizing co...
A. P. Wim Böhm, J. Ross Beveridge, Bruce A. D...
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
CCS
2006
ACM
15 years 1 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
ISSRE
2007
IEEE
14 years 11 months ago
Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records
During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same f...
Mark Sherriff, Mike Lake, Laurie Williams
DGO
2008
126views Education» more  DGO 2008»
14 years 11 months ago
Active learning for e-rulemaking: public comment categorization
We address the e-rulemaking problem of reducing the manual labor required to analyze public comment sets. In current and previous work, for example, text categorization techniques...
Stephen Purpura, Claire Cardie, Jesse Simons