Sciweavers

2715 search results - page 97 / 543
» An Implementation of Narrowing Strategies
Sort
View
SIGIR
2005
ACM
14 years 2 months ago
Optimization strategies for complex queries
Previous research into the efficiency of text retrieval systems has dealt primarily with methods that consider inverted lists in sequence; these methods are known as term-at-a-tim...
Trevor Strohman, Howard R. Turtle, W. Bruce Croft
ICCBR
2003
Springer
14 years 2 months ago
Evaluation of Case-Based Maintenance Strategies in Software Design
CBR applications running in real domains can easily reach thousands of cases, which are stored in the case library. Retrieval times can increase greatly if the retrieval algorithm ...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
SAFECOMP
2001
Springer
14 years 1 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
VLSID
1996
IEEE
119views VLSI» more  VLSID 1996»
14 years 1 months ago
Parallel simulated annealing strategies for VLSI cell placement
Simulated annealing based standard cell placement for VLSI designs has long been acknowledged as a compute-intensive process, and as a result several research efforts have been un...
John A. Chandy, Prithviraj Banerjee
ACISP
2007
Springer
14 years 29 days ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...