Sciweavers

4155 search results - page 745 / 831
» External Memory Algorithms
Sort
View
CAV
2008
Springer
108views Hardware» more  CAV 2008»
14 years 9 days ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
14 years 8 days ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CIBB
2008
14 years 8 days ago
Mining Association Rule Bases from Integrated Genomic Data and Annotations
During the last decade, several clustering and association rule mining techniques have been applied to highlight groups of coregulated genes in gene expression data. Nowadays, inte...
Ricardo Martínez, Nicolas Pasquier, Claude ...
CIKM
2008
Springer
14 years 8 days ago
Scaling up duplicate detection in graph data
Duplicate detection determines different representations of realworld objects in a database. Recent research has considered the use of relationships among object representations t...
Melanie Herschel, Felix Naumann
CONEXT
2005
ACM
14 years 7 days ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati