Sciweavers

3911 search results - page 772 / 783
» Using Operational Architecture to Model Embedded Software
Sort
View
ICAI
2008
13 years 8 months ago
Nonrestrictive Concept-Acquisition by Representational Redescription
coarse procedures or very abstract frames from the point of view of algorithm, because some crucial issues like the representation, evolution, storage, and learning process of conc...
Hui Wei, Yan Chen
CIDR
2009
181views Algorithms» more  CIDR 2009»
13 years 7 months ago
The Case for RodentStore: An Adaptive, Declarative Storage System
Recent excitement in the database community surrounding new applications--analytic, scientific, graph, geospatial, etc.--has led to an explosion in research on database storage sy...
Philippe Cudré-Mauroux, Eugene Wu, Samuel M...
ESCIENCE
2007
IEEE
13 years 10 months ago
CDF Monte Carlo Production on LCG Grid via LcgCAF Portal
The improvements of the luminosity of the Tevatron Collider require large increases in computing requirements for the CDF experiment which has to be able to increase proportionally...
Gabriele Compostella, Donatella Lucchesi, Simone P...
SIMPRA
2008
106views more  SIMPRA 2008»
13 years 6 months ago
CEST and MEST: Tools for the simulation of radio frequency electric discharges in waveguides
In this paper we present two software tools for the simulation of electron multiplication processes in radio frequency (RF) waveguides. The electric discharges are caused by the m...
Francisco Pérez, Juan de Lara, Luis Conde, ...
CCS
2010
ACM
13 years 3 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...