Sciweavers

2763 search results - page 99 / 553
» The Dangerous 'All' in Specifications
Sort
View
ACE
2004
157views Education» more  ACE 2004»
13 years 10 months ago
Employer Satisfaction with ICT graduates
As part of a study of the teaching of Information and Communications Technology in Australian universities, employers were surveyed in 2001 to find out how satisfied they were wit...
Dianne Hagan
ACL
1996
13 years 10 months ago
A Synopsis of Learning to Recognize Names Across Languages
The development of natural language processing (NLP) systems that perform machine translation (MT) and information retrieval (IR) has highlighted the need for the automatic recogn...
Anthony F. Gallippi
CCS
2010
ACM
13 years 9 months ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
CAL
2008
13 years 9 months ago
A Parallel Deadlock Detection Algorithm with O(1) Overall Run-time Complexity
This article proposes a novel parallel, hardware-oriented deadlock detection algorithm for multiprocessor system-on-chips. The proposed algorithm takes full advantage of hardware ...
Jaehwan John Lee, Xiang Xiao
CORR
2008
Springer
77views Education» more  CORR 2008»
13 years 9 months ago
Data-Oblivious Stream Productivity
Abstract. We are concerned with demonstrating productivity of specifications of infinite streams of data, based on orthogonal rewrite rules. In general, this property is undecidabl...
Jörg Endrullis, Clemens Grabmayer, Dimitri He...