Sciweavers

1513 search results - page 202 / 303
» Cryptographic Pattern Matching
Sort
View
126
Voted
OOPSLA
2007
Springer
15 years 8 months ago
No ifs, ands, or buts: uncovering the simplicity of conditionals
Schematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogona...
Jonathan Edwards
111
Voted
PADL
2007
Springer
15 years 8 months ago
Applications, Implementation and Performance Evaluation of Bit Stream Programming in Erlang
Writing code that manipulates bit streams is a painful and error-prone programming task, often performed via bit twiddling techniques such as explicit bit shifts and bit masks in p...
Per Gustafsson, Konstantinos F. Sagonas
97
Voted
CBMS
2006
IEEE
15 years 8 months ago
A Method for Fetal Heart Rate Extraction Based on Time-Frequency Analysis
A three-stage method for fetal heart rate extraction, from abdominal ECG recordings, is proposed. In the first stage the maternal R-peaks and fiducial points (QRS onset and offset...
E. C. Karvounis, Markos G. Tsipouras, Dimitrios I....
LCN
2006
IEEE
15 years 8 months ago
Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System
Structured Peer-to-Peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called Distributed Hash Tables (DHTs) ...
Simon Rieche, Klaus Wehrle, Leo Petrak, Clemens Wr...
123
Voted
NCA
2006
IEEE
15 years 8 months ago
A Flexible Replication Mechanism with Extended Database Connection Layers
It is vital to achieve a disaster recovery system that allows a backup site to take over a primary site’s IT services while the primary site is down. We propose a flexible repli...
Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawa...