Sciweavers

3238 search results - page 267 / 648
» Multi-return function call
Sort
View
CSFW
2009
IEEE
14 years 8 days ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
ICMCS
1997
IEEE
140views Multimedia» more  ICMCS 1997»
13 years 12 months ago
MusiKalscope: A Graphical Musical Instrument
This paper introduces a new multi-media system for musical and graphical expression called MusiKalscope. Inside of MusiKalscope are two sub-systems: RhyMe and the Iamascope, conne...
Sidney Fels, Kazushi Nishimoto, Kenji Mase
SIGSOFT
2003
ACM
14 years 9 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
KDD
2007
ACM
276views Data Mining» more  KDD 2007»
14 years 8 months ago
Nonlinear adaptive distance metric learning for clustering
A good distance metric is crucial for many data mining tasks. To learn a metric in the unsupervised setting, most metric learning algorithms project observed data to a lowdimensio...
Jianhui Chen, Zheng Zhao, Jieping Ye, Huan Liu
KDD
2004
ACM
143views Data Mining» more  KDD 2004»
14 years 8 months ago
Incremental maintenance of quotient cube for median
Data cube pre-computation is an important concept for supporting OLAP(Online Analytical Processing) and has been studied extensively. It is often not feasible to compute a complet...
Cuiping Li, Gao Cong, Anthony K. H. Tung, Shan Wan...