Sciweavers

984 search results - page 184 / 197
» Experimenting with Multi-Level Models in a Two-Level Modelin...
Sort
View
CCS
2010
ACM
15 years 7 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
212
Voted
TASE
2011
IEEE
14 years 10 months ago
KnitSketch: A Sketch Pad for Conceptual Design of 2D Garment Patterns
—In this paper, we present a new sketch-based system — KnitSketch, to improve the efficiency of process planning for knitting garments at an early design stage. The KnitSketch...
Cui-Xia Ma, Yong-Jin Liu, Hai-Yan Yang, Dong-Xing ...
145
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
STOC
1993
ACM
264views Algorithms» more  STOC 1993»
15 years 7 months ago
Contention in shared memory algorithms
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of ...
Cynthia Dwork, Maurice Herlihy, Orli Waarts
127
Voted
FLAIRS
2007
15 years 5 months ago
Assessing Entailer with a Corpus of Natural Language from an Intelligent Tutoring System
In this study, we compared Entailer, a computational tool that evaluates the degree to which one text is entailed by another, to a variety of other text relatedness metrics (LSA, ...
Philip M. McCarthy, Vasile Rus, Scott A. Crossley,...