Sciweavers

4072 search results - page 783 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
TPHOL
1998
IEEE
13 years 11 months ago
The Village Telephone System: A Case Study in Formal Software Engineering
In this paper we illustrate the use of formal methods in the development of a benchmark application we call the Village Telephone System which is characteristic of a class of netwo...
Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gun...
ARVLSI
1995
IEEE
78views VLSI» more  ARVLSI 1995»
13 years 11 months ago
A technique for high-speed, fine-resolution pattern generation and its CMOS implementation
This paper presents an architecture for generating a high-speed data pattern with precise edge placement resolution by using the matched delay technique. The technique involves ...
Gary C. Moyer, Mark Clements, Wentai Liu, Toby Sch...
CIKM
2010
Springer
13 years 6 months ago
Automatic metadata extraction from multilingual enterprise content
Enterprises provide professionally authored content about their products/services in different languages for use in web sites and customer care. For customer care, personalization...
Melike Sah, Vincent Wade
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
14 years 7 months ago
GraphScope: parameter-free mining of large time-evolving graphs
How can we find communities in dynamic networks of social interactions, such as who calls whom, who emails whom, or who sells to whom? How can we spot discontinuity timepoints in ...
Jimeng Sun, Christos Faloutsos, Spiros Papadimitri...
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...