Sciweavers

885 search results - page 131 / 177
» An investigation of the performance of various dynamic sched...
Sort
View
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
14 years 9 days ago
Efficient Generation of Prime Numbers
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
Marc Joye, Pascal Paillier, Serge Vaudenay
GOSLER
1995
14 years 8 days ago
A Guided Tour Across the Boundaries of Learning Recursive Languages
The present paper deals with the learnability of indexed families of uniformly recursive languages from positive data as well as from both, positive and negative data. We consider...
Thomas Zeugmann, Steffen Lange
LREC
2008
88views Education» more  LREC 2008»
13 years 10 months ago
An Infrastructure, Tools and Methodology for Evaluation of Multicultural Name Matching Systems
This paper describes a Name Matching Evaluation Laboratory that is a joint effort across multiple projects. The lab houses our evaluation infrastructure as well as multiple name m...
Keith J. Miller, Mark Arehart, Catherine Ball, Joh...
ITNG
2010
IEEE
13 years 7 months ago
Towards Adaptive Replication Reconfiguration for QoS
— Replication is a technique widely used for large networked software systems to provide qualities such as reliability, availability, performance and scalability to their clients...
Raihan Al-Ekram, Richard C. Holt
CAV
2012
Springer
222views Hardware» more  CAV 2012»
11 years 11 months ago
Leveraging Interpolant Strength in Model Checking
Craig interpolation is a well known method of abstraction successfully used in both hardware and software model checking. The logical strength of interpolants can affect the quali...
Simone Fulvio Rollini, Ondrej Sery, Natasha Sharyg...