Sciweavers

2180 search results - page 345 / 436
» Performance analysis of concurrent systems with early evalua...
Sort
View
147
Voted
CLEF
2007
Springer
15 years 10 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy
TASE
2007
IEEE
15 years 11 months ago
Model Checking Software at Compile Time
Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
126
Voted
ASPDAC
2005
ACM
98views Hardware» more  ASPDAC 2005»
15 years 10 months ago
Bitwidth-aware scheduling and binding in high-level synthesis
- Many high-level description languages, such as C/C++ or Java, lack the capability to specify the bitwidth information for variables and operations. Synthesis from these specifica...
Jason Cong, Yiping Fan, Guoling Han, Yizhou Lin, J...
KDD
1998
ACM
160views Data Mining» more  KDD 1998»
15 years 8 months ago
Algorithms for Characterization and Trend Detection in Spatial Databases
1 The number and the size of spatial databases, e.g. for geomarketing, traffic control or environmental studies, are rapidly growing which results in an increasing need for spatial...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
IJBC
2006
93views more  IJBC 2006»
15 years 4 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li