Sciweavers

2715 search results - page 382 / 543
» Network bucket testing
Sort
View
IPPS
1998
IEEE
14 years 1 months ago
Trace-Driven Debugging of Message Passing Programs
In this paper we report on features added to a parallel debugger to simplify the debugging of message passing programs. These features include replay, setting consistent breakpoin...
Michael A. Frumkin, Robert Hood, Luis Lopez
FPL
1997
Springer
242views Hardware» more  FPL 1997»
14 years 1 months ago
Technology mapping by binate covering
Technology mapping can be viewed as the optimization problem of finding a minimum cost cover of the given Boolean network by choosing from given library of logic cells. The core of...
Michal Servít, Kang Yi
DEXAW
2007
IEEE
172views Database» more  DEXAW 2007»
14 years 1 months ago
X-SOM: A Flexible Ontology Mapper
System interoperability is a well known issue, especially for heterogeneous information systems, where ontologybased representations may support automatic and usertransparent inte...
Carlo Curino, Giorgio Orsi, Letizia Tanca
ECRIME
2007
14 years 1 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
FC
2010
Springer
196views Cryptology» more  FC 2010»
14 years 1 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller