Sciweavers

12289 search results - page 2142 / 2458
» computing 2006
Sort
View
173
Voted
ATVA
2006
Springer
114views Hardware» more  ATVA 2006»
15 years 8 months ago
Selective Approaches for Solving Weak Games
Abstract. Model-checking alternating-time properties has recently attracted much interest in the verification of distributed protocols. While checking the validity of a specificati...
Malte Helmert, Robert Mattmüller, Sven Schewe
AUSDM
2006
Springer
118views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Efficiently Identifying Exploratory Rules' Significance
How to efficiently discard potentially uninteresting rules in exploratory rule discovery is one of the important research foci in data mining. Many researchers have presented algor...
Shiying Huang, Geoffrey I. Webb
138
Voted
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 8 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
CASES
2006
ACM
15 years 8 months ago
Efficient architectures through application clustering and architectural heterogeneity
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Lukasz Strozek, David Brooks
« Prev « First page 2142 / 2458 Last » Next »