Sciweavers

1405 search results - page 30 / 281
» We Are No Longer A Priesthood
Sort
View
RTSS
1996
IEEE
15 years 1 months ago
A multiframe model for real-time tasks
The well-known periodic task model of Liu and Layland 1] assumes a worst-case execution time bound for every task and may be too pessimistic if the worst-case execution time of a ...
Aloysius K. Mok, Deji Chen
KR
1989
Springer
15 years 1 months ago
Situated Control Rules
In this work we extend the work of Dean, Kaelbling, Kirman and Nicholson on planning under time constraints in stochastic domains to handle more complicated scheduling problems. I...
Mark Drummond
ASPDAC
2007
ACM
74views Hardware» more  ASPDAC 2007»
15 years 1 months ago
A Theoretical Study on Wire Length Estimation Algorithms for Placement with Opaque Blocks
How to estimate the shortest routing length when certain blocks are considered as routing obstacles is becoming an essential problem for block placement because HPWL is no longer v...
Tan Yan, Shuting Li, Yasuhiro Takashima, H. Murata
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
15 years 1 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
74
Voted
ECAI
2006
Springer
15 years 1 months ago
Text Sampling and Re-Sampling for Imbalanced Authorship Identification Cases
Authorship identification can be seen as a single-label multi-class text categorization problem. Very often, there are extremely few training texts at least for some of the candida...
Efstathios Stamatatos