Sciweavers

8874 search results - page 1743 / 1775
» A New Implementation of Automath
Sort
View
132
Voted
IJFCS
2006
110views more  IJFCS 2006»
15 years 3 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
146
Voted
IJNSEC
2006
134views more  IJNSEC 2006»
15 years 3 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
136
Voted
CORR
2007
Springer
126views Education» more  CORR 2007»
15 years 3 months ago
Linear Tabling Strategies and Optimizations
Recently there has been a growing interest of research in tabling in the logic programming community because of its usefulness in a variety of application domains including progra...
Neng-Fa Zhou, Taisuke Sato, Yi-Dong Shen
131
Voted
JCST
2008
121views more  JCST 2008»
15 years 3 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
107
Voted
CORR
2007
Springer
90views Education» more  CORR 2007»
15 years 3 months ago
Discrete Denoising with Shifts
We introduce S-DUDE, a new algorithm for denoising Discrete Memoryless Channel (DMC)-corrupted data. The algorithm, which generalizes the recently introduced DUDE (Discrete Univer...
Taesup Moon, Tsachy Weissman
« Prev « First page 1743 / 1775 Last » Next »