Sciweavers

5863 search results - page 1050 / 1173
» On Model-Checking of P Systems
Sort
View
MDM
2010
Springer
194views Communications» more  MDM 2010»
15 years 6 months ago
Timing and Radius Considerations for Maintaining Connectivity QoS
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
CICLING
2008
Springer
15 years 6 months ago
Arabic/English Multi-document Summarization with CLASSY - The Past and the Future
Abstract. Automatic document summarization has become increasingly important due to the quantity of written material generated worldwide. Generating good quality summaries enables ...
Judith D. Schlesinger, Dianne P. O'Leary, John M. ...
AICCSA
2006
IEEE
121views Hardware» more  AICCSA 2006»
15 years 6 months ago
Software Defect Prediction Using Regression via Classification
In this paper we apply a machine learning approach to the problem of estimating the number of defects called Regression via Classification (RvC). RvC initially automatically discr...
Stamatia Bibi, Grigorios Tsoumakas, Ioannis Stamel...
117
Voted
IWMM
2010
Springer
125views Hardware» more  IWMM 2010»
15 years 6 months ago
Efficient memory shadowing for 64-bit architectures
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and s...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
15 years 6 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
« Prev « First page 1050 / 1173 Last » Next »