Sciweavers

254 search results - page 27 / 51
» On the Limitations of Provenance for Queries With Difference
Sort
View
ERLANG
2007
ACM
13 years 11 months ago
Extended process registry for Erlang
The built-in process registry has proven to be an extremely useful feature of the Erlang language. It makes it easy to provide named services, which can be reached without knowing...
Ulf Wiger
ICB
2007
Springer
164views Biometrics» more  ICB 2007»
13 years 11 months ago
Hardening Fingerprint Fuzzy Vault Using Password
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure te...
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain
EUROMICRO
2004
IEEE
13 years 11 months ago
SaveCCM - A Component Model for Safety-Critical Real-Time Systems
Component-based development has proven effective in many engineering domains, and several general component technologies are available. Most of these are focused on providing an e...
Hans Hansson, Mikael Åkerholm, Ivica Crnkovi...
ASPDAC
2005
ACM
102views Hardware» more  ASPDAC 2005»
13 years 9 months ago
A framework for automated and optimized ASIP implementation supporting multiple hardware description languages
— Architecture Description Languages (ADLs) are widely used to perform design space exploration for Application Specific Instruction Set Processors (ASIPs). While the design spa...
Oliver Schliebusch, Anupam Chattopadhyay, David Ka...
CSREAEEE
2006
174views Business» more  CSREAEEE 2006»
13 years 9 months ago
Using Temporal Information in Collaborative Filtering: An Empirical Study
- Collaborative filtering is a widely used and proven method of building recommender systems that provide personalized recommendations on products or services based on explicit rat...
Young Park, Tong-Queue Lee