Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,035,481 papers from all fields of science
Search
Sign In
Create Free Account
Edward Wegman
Known as:
Edward J. Wegman
, Wegman
Edward Wegman is an American statistician and a professor of statistics at George Mason University. He holds a Ph.D. in mathematical statistics and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Social network analysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Fabrication and testing of a high-temperature printed circuit heat exchanger
Minghui Chen
,
Xiaodong Sun
,
R. Christensen
,
I. Skavdahl
,
V. Utgikar
,
P. Sabharwall
2015
Corpus ID: 136109191
One of the very-high-temperature gas-cooled reactors’ (VHTRs) missions is to produce electricity and provide process heat for…
Expand
2010
2010
An Efficient Nominal Unification Algorithm
Jordi Levy
,
Mateu Villaret
International Conference on Rewriting Techniques…
2010
Corpus ID: 316481
Nominal Unification is an extension of first-order unification where terms can contain binders and unification is performed…
Expand
Highly Cited
2004
Highly Cited
2004
Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM)
I. Rigoutsos
,
T. Huynh
International Conference on Email and Anti-Spam
2004
Corpus ID: 17938722
In this paper, we present Chung-Kwei1, a system for the analysis of electronic messages and the automatic identification of…
Expand
2003
2003
On the Use of GF-Inversion as a Cryptographic Primitive
Kazumaro Aoki
,
S. Vaudenay
ACM Symposium on Applied Computing
2003
Corpus ID: 45245882
Inversion in Galois Fields is a famous primitive permutation for designing cryptographic algorithms e.g. for Rijndael because it…
Expand
2002
2002
On some mathematics for visualizing high dimensional data
E. Wegman
,
J. Solka
2002
Corpus ID: 14303673
The analysis of high-dimensional data offers a great challenge to the analyst because the human intuition about geometry of high…
Expand
Highly Cited
2001
Highly Cited
2001
The faithfulness of abstract protocol analysis: message authentication
J. Guttman
,
F. Thayer
,
L. Zuck
Conference on Computer and Communications…
2001
Corpus ID: 8035608
Dolev and Yao initiated an approach to studying cryptographic protocols which abstracts from possible problems with the…
Expand
2001
2001
Numerical Power Analysis
Isabella Mastroeni
Symposium on Programs as Data Objects
2001
Corpus ID: 20804685
In this paper we design abstract domains for numerical power analysis. These domains are conceived to discover properties of the…
Expand
1999
1999
Dependence Analysis for Java
C. Chambers
,
Igor Pechtchanski
,
Vivek Sarkar
,
M. Serrano
,
H. Srinivasan
International Workshop on Languages and Compilers…
1999
Corpus ID: 15228499
We describe a novel approach to performing data dependence analysis for Java in the presence of Java's "non-traditional" language…
Expand
Highly Cited
1994
Highly Cited
1994
Multidimensional Lines II: Proximity and Applications
A. Inselberg
,
B. Dimsdale
SIAM Journal on Applied Mathematics
1994
Corpus ID: 3182132
In [Inselberg and Dimsdale, SIAM J Appl. Math., 54 (1994), pp. 559–577] it was shown that in coordinates any line in $R^N $ can…
Expand
1992
1992
Compiler-directed storage reclamation using object lifetime analysis
James E. Hicks
,
Arvind
1992
Corpus ID: 59924401
Many heap-oriented languages such as Lisp and Id depend on run-time garbage collection to reclaim storage. Garbage collection can…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE