Sciweavers

1407 search results - page 254 / 282
» Using Use Cases in Executable Z
Sort
View
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 4 days ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
118
Voted
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 2 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
124
Voted
POPL
2009
ACM
15 years 9 months ago
Low-pain, high-gain multicore programming in Haskell: coordinating irregular symbolic computations on multicore architectures
With the emergence of commodity multicore architectures, exploiting tightly-coupled parallelism has become increasingly important. Functional programming languages, such as Haskel...
Abdallah Al Zain, Kevin Hammond, Jost Berthold, Ph...
ADAEUROPE
2000
Springer
15 years 6 months ago
(True) Polymorphism in SPARK2000
of the Reliant Telco Platform, K. Wiesneth Safety-oriented INTERBUS INTERBUS Safety-, K. Meyer-Graefe Developing a Binding Process for Automated Program Recognition and Fault Local...
Tse-Min Lin, John A. McDermid
EDBT
2010
ACM
145views Database» more  EDBT 2010»
15 years 5 months ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre