Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
348
search results - page 18 / 70
»
di 2008
Sort
relevance
views
votes
recent
update
View
thumb
title
15
click to vote
SOCO
2008
Springer
98
views
Software Engineering
»
more
SOCO 2008
»
Search-based inference of dialect grammars
13 years 7 months ago
Download
www4.ncsu.edu
Massimiliano Di Penta, Pierpaolo Lombardi, Kunal T...
claim paper
Read More »
16
click to vote
CIKM
2008
Springer
83
views
Information Technology
»
more
CIKM 2008
»
Finding informative commonalities in concept collections
13 years 9 months ago
Download
sisinflab.poliba.it
Simona Colucci, Eugenio Di Sciascio, Francesco M. ...
claim paper
Read More »
9
click to vote
ISCAS
2008
IEEE
94
views
Hardware
»
more
ISCAS 2008
»
ADAPTO: full-adder based reconfigurable architecture for bit level operations
14 years 2 months ago
Download
www2.imm.dtu.dk
Gian-Carlo Cardarilli, Luca Di Nunzio, Marco Re, A...
claim paper
Read More »
21
click to vote
ETS
2008
IEEE
108
views
Hardware
»
more
ETS 2008
»
Applying Web-Enabled Problem-Based Learning and Self-Regulated Learning to Add Value to Computing Education in Taiwan's Vocation
13 years 7 months ago
Download
www.ifets.info
Tsang-Hsiung Lee, Pei-Di Shen, Chia-Wen Tsai
claim paper
Read More »
20
click to vote
DI
2006
156
views
more
DI 2006
»
Identifying almost identical files using context triggered piecewise hashing
13 years 7 months ago
Download
www.accessdata.com
Fuzzy hashing allows the discovery of potentially incriminating documents that may not be located using traditional hashing methods. The use of the fuzzy hash is much like the fuz...
Jesse D. Kornblum
claim paper
Read More »
« Prev
« First
page 18 / 70
Last »
Next »