Sciweavers

6202 search results - page 48 / 1241
» Without Loss of Generality
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
LCTRTS
2004
Springer
15 years 3 months ago
Flattening statecharts without explosions
We present a polynomial upper bound for flattening of UML statecharts. An efficient flattening technique is derived and implemented in SCOPE—a code generator targeting constra...
Andrzej Wasowski
AOSD
2003
ACM
15 years 3 months ago
Navigating and querying code without getting lost
A development task related to a crosscutting concern is challenging because a developer can easily get lost when exploring scattered elements of code and the complex tangle of rel...
Doug Janzen, Kris De Volder
ASSETS
2008
ACM
14 years 12 months ago
Adapting word prediction to subject matter without topic-labeled data
Word prediction helps to increase communication rate when using Augmentative and Alternative Communication devices. Basic prediction systems offer topically inappropriate predicti...
Keith Trnka
CONNECTION
2004
98views more  CONNECTION 2004»
14 years 9 months ago
Self-refreshing memory in artificial neural networks: learning temporal sequences without catastrophic forgetting
While humans forget gradually, highly distributed connectionist networks forget catastrophically: newly learned information often completely erases previously learned information. ...
Bernard Ans, Stephane Rousset, Robert M. French, S...