Sciweavers

151
Voted
APCSAC
2004
IEEE
15 years 8 months ago
Validating Word-Oriented Processors for Bit and Multi-word Operations
We examine secure computing paradigms to identify any new architectural challenges for future general-purpose processors. Some essential security functions can be provided by diffe...
Ruby B. Lee, Xiao Yang, Zhijie Shi
125
Voted
AIMSA
2006
Springer
15 years 8 months ago
N-Gram Feature Selection for Authorship Identification
Automatic authorship identification offers a valuable tool for supporting crime investigation and security. It can be seen as a multi-class, single-label text categorization task. ...
John Houvardas, Efstathios Stamatatos
AIMSA
2006
Springer
15 years 8 months ago
A Knowledge-Based Approach for Automatic Generation of Summaries of Behavior
Effective automatic summarization usually requires simulating asoning such as abstraction or relevance reasoning. In this paper we describe a solution for this type of reasoning in...
Martín Molina, Victor Flores
APCSAC
2004
IEEE
15 years 8 months ago
Continuous Adaptive Object-Code Re-optimization Framework
Dynamic optimization presents opportunities for finding run-time bottlenecks and deploying optimizations in statically compiled programs. In this paper, we discuss our current impl...
Howard Chen, Jiwei Lu, Wei-Chung Hsu, Pen-Chung Ye...
AIMSA
2006
Springer
15 years 8 months ago
Study on Integrating Semantic Applications with Magpie
Abstract. This paper describes two approaches to integrating standalone information processing techniques into a semantic application capable of acquiring and maintaining knowledge...
Martin Dzbor, Enrico Motta