This paper presents a flexible FPGA architecture evaluation framework, named fpgaEVA-LP, for power efficiency analysis of LUT-based FPGA architectures. Our work has several contri...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Abstract. We introduce a concept of similarity between vertices of directed graphs. Let GA and GB be two directed graphs with respectively nA and nB vertices. We define a nA × nB...
In this paper we present FormSys, a Web-based system that service-enables form documents. It offers two main services: filling in forms based on Web services’ incoming SOAP me...
Ingo M. Weber, Hye-Young Paik, Boualem Benatallah,...
Topic models could have a huge impact on improving the ways users find and discover content in digital libraries and search interfaces, through their ability to automatically lea...
David Newman, Youn Noh, Edmund M. Talley, Sarvnaz ...