Sciweavers

1094 search results - page 196 / 219
» List signature schemes
Sort
View
ICFP
2002
ACM
14 years 7 months ago
A demand-driven adaptive type analysis
Compilers for dynamically and statically typed languages ensure safe execution by verifying that all operations are performed on appropriate values. An operation as simple as car ...
Danny Dubé, Marc Feeley
BIBE
2008
IEEE
115views Bioinformatics» more  BIBE 2008»
14 years 2 months ago
The Mouse Resource Browser (MRB) - A near-complete registry of mouse resources
—The Mouse Resource Browser MRB (http://bioit.fleming.gr/mrb) is an easy-to-use database for searching and retrieving mouse resource information. Currently, MRB hosts a list of 2...
Michael Zouberakis, C. Chandras, John M. Hancock, ...
VTS
2008
IEEE
83views Hardware» more  VTS 2008»
14 years 1 months ago
LS-TDF: Low-Switching Transition Delay Fault Pattern Generation
— Higher chip densities and the push for higher performance have continued to drive design needs. Transition delay fault testing has become the preferred method for ensuring thes...
Jeremy Lee, Mohammad Tehranipoor
ICDM
2007
IEEE
206views Data Mining» more  ICDM 2007»
14 years 1 months ago
A Novel Rule Weighting Approach in Classification Association Rule Mining
Classification Association Rule Mining (CARM) is a recent Classification Rule Mining (CRM) approach that builds an Association Rule Mining (ARM) based classifier using Classificat...
Yanbo J. Wang, Qin Xin, Frans Coenen
ESAS
2007
Springer
14 years 1 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...