Sciweavers

1687 search results - page 181 / 338
» Which pointer analysis should I use
Sort
View
BMCBI
2007
141views more  BMCBI 2007»
15 years 4 months ago
A novel approach to detect hot-spots in large-scale multivariate data
Background: Progressive advances in the measurement of complex multifactorial components of biological processes involving both spatial and temporal domains have made it difficult...
Jianhua Wu, Keith M. Kendrick, Jianfeng Feng
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
15 years 11 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
INFOCOM
1999
IEEE
15 years 8 months ago
Ring versus Tree Embedding for Real-time Group Multicast
In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O...
Mario Baldi, Yoram Ofek
PROMISE
2010
14 years 11 months ago
How effective is Tabu search to configure support vector regression for effort estimation?
Background. Recent studies have shown that Support Vector Regression (SVR) has an interesting potential in the field of effort estimation. However applying SVR requires to careful...
Anna Corazza, Sergio Di Martino, Filomena Ferrucci...
EUROCRYPT
1995
Springer
15 years 8 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail