Sciweavers

279 search results - page 3 / 56
» The Rise and Rise of Citation Analysis
Sort
View
EFDBS
2000
13 years 7 months ago
Citation Linking in Federated Digital Libraries
Today, bibliographical information is kept in a variety of data sources world wide, some of them publically available, and some of them also offering information about citations m...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler
PEPM
1994
ACM
13 years 10 months ago
PERs from Projections for Binding-Time Analysis
First-order projection-based binding-time analysis has proven genuinely useful in partial evaluation Lau91a, Lau91c]. There have been three notable generalisations of projection-b...
Kei Davis
ICANN
2009
Springer
14 years 16 days ago
Decomposition Methods for Detailed Analysis of Content in ERP Recordings
The processes giving rise to an event related potential engage several evoked and induced oscillatory components, which reflect phase or non-phase locked activity throughout the mu...
Vasiliki Iordanidou, Kostas Michalopoulos, Vangeli...
ISSRE
2010
IEEE
13 years 4 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
WISEC
2010
ACM
13 years 10 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt