Sciweavers

2715 search results - page 413 / 543
» An Implementation of Narrowing Strategies
Sort
View
CHES
2003
Springer
119views Cryptology» more  CHES 2003»
14 years 3 months ago
Faster Double-Size Modular Multiplication from Euclidean Multipliers
Abstract. A novel technique for computing a 2n-bit modular multiplication using n-bit arithmetic was introduced at CHES 2002 by Fischer and Seifert. Their technique makes use of an...
Benoît Chevallier-Mames, Marc Joye, Pascal P...
CIA
2003
Springer
14 years 3 months ago
Send Fredo off to Do This, Send Fredo off to Do That
Abstract. Fredo is a generic domain-independent broker that creates valueadded information taking into account the preferences specified by its clients. Fredo uses ontology service...
Luís Miguel Botelho, Hugo Mendes, Pedro Fig...
CIKM
2003
Springer
14 years 3 months ago
Question answering from the web using knowledge annotation and knowledge mining techniques
We present a strategy for answering fact-based natural language questions that is guided by a characterization of realworld user queries. Our approach, implemented in a system cal...
Jimmy J. Lin, Boris Katz
EMSOFT
2003
Springer
14 years 3 months ago
Schedule-Carrying Code
We introduce the paradigm of schedule-carrying code (SCC). A hard real-time program can be executed on a given platform only if there exists a feasible schedule for the real-time t...
Thomas A. Henzinger, Christoph M. Kirsch, Slobodan...
EMSOFT
2003
Springer
14 years 3 months ago
Space Reductions for Model Checking Quasi-Cyclic Systems
Despite significant research on state-space reductions, the poor scalability of model checking for reasoning about behavioral models of large, complex systems remains the chief ob...
Matthew B. Dwyer, Robby, Xianghua Deng, John Hatcl...