Sciweavers

1513 search results - page 252 / 303
» Cryptographic Pattern Matching
Sort
View
VTS
1997
IEEE
73views Hardware» more  VTS 1997»
13 years 12 months ago
Obtaining High Fault Coverage with Circular BIST Via State Skipping
Despite all of the advantages that circular BIST ofsers compared to conventional BIST approaches in terms of low area overhead, simple control logic, and easy insertion, it has se...
Nur A. Touba
POPL
1997
ACM
13 years 12 months ago
Type-Checking Higher-Order Polymorphic Multi-Methods
We present a new predicative and decidable type system, called ML , suitable for languages that integrate functional programming and parametric polymorphism in the tradition of ML...
François Bourdoncle, Stephan Merz
STOC
1993
ACM
87views Algorithms» more  STOC 1993»
13 years 12 months ago
How to use expert advice
We analyze algorithms that predict a binary value by combining the predictions of several prediction strategies, called experts. Our analysis is for worst-case situations, i.e., we...
Nicolò Cesa-Bianchi, Yoav Freund, David P. ...
VLDB
1993
ACM
116views Database» more  VLDB 1993»
13 years 12 months ago
Algebraic Optimization of Computations over Scientific Databases
Although scientific data analysis increasingly requires accessandmanipulation of large quantitiesof data,current databasetechnology fails to meet the needsof scientific processing...
Richard H. Wolniewicz, Goetz Graefe
ACMSE
1990
ACM
13 years 12 months ago
Computerizing a machine readable dictionary
Current research in natural language processing is characterized by the development of theories of grammar which strongly depend on the lexicon to drive parsing systems (e.g. Lexi...
Jan G. Wilms