Sciweavers

380 search results - page 65 / 76
» Design Methods for Multiple-Valued Input Address Generators
Sort
View
KDD
2007
ACM
155views Data Mining» more  KDD 2007»
14 years 8 months ago
Mining templates from search result records of search engines
Metasearch engine, Comparison-shopping and Deep Web crawling applications need to extract search result records enwrapped in result pages returned from search engines in response ...
Hongkun Zhao, Weiyi Meng, Clement T. Yu
CCS
2007
ACM
14 years 2 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
ATAL
2005
Springer
14 years 1 months ago
Comprehending agent software
Software comprehension (understanding software structure and behavior) is essential for developing, maintaining, and improving software. This is particularly true of agent-based s...
Dung N. Lam, K. Suzanne Barber
INFOVIS
2003
IEEE
14 years 1 months ago
MoireGraphs: Radial Focus+Context Visualization and Interaction for Graphs with Visual Nodes
Graph and tree visualization techniques enable interactive exploration of complex relations while communicating topology. However, most existing techniques have not been designed ...
T. J. Jankun-Kelly, Kwan-Liu Ma
ASPDAC
2008
ACM
130views Hardware» more  ASPDAC 2008»
13 years 10 months ago
Architecture-level thermal behavioral characterization for multi-core microprocessors
In this paper, we investigate a new architecture-level thermal characterization problem from behavioral modeling perspective to address the emerging thermal related analysis and o...
Duo Li, Sheldon X.-D. Tan, Murli Tirumala