Sciweavers

1369 search results - page 169 / 274
» A Practical Implementation of the Timing Attack
Sort
View
IJBRA
2010
133views more  IJBRA 2010»
14 years 8 months ago
Scalable biomedical Named Entity Recognition: investigation of a database-supported SVM approach
This paper explores the scalability issues associated with solving the Named Entity Recognition (NER) problem using Support Vector Machines (SVM) and high-dimensional features and ...
Mona Soliman Habib, Jugal Kalita
PERCOM
2009
ACM
15 years 11 months ago
Proactive and Adaptive Fuzzy Profile Control for Mobile Phones
In this paper we describe a context-sensitive way to change an active mobile phone profile. We present a method to create a proactive and adaptive phone profile control system that...
Miika Valtonen, Antti-Matti Vainio, Jukka Vanhala
POPL
2001
ACM
15 years 11 months ago
Avoiding exponential explosion: generating compact verification conditions
Current verification condition (VC) generation algorithms, such as weakest preconditions, yield a VC whose size may be exponential in the size of the code fragment being checked. ...
Cormac Flanagan, James B. Saxe
VLDB
2007
ACM
95views Database» more  VLDB 2007»
15 years 11 months ago
The GCX System: Dynamic Buffer Minimization in Streaming XQuery Evaluation
In this demonstration, we present the main-memory based streaming XQuery engine GCX which implements novel buffer management strategies that combine static and dynamic analysis to...
Christoph Koch, Stefanie Scherzinger, Michael Schm...
EVOW
2010
Springer
15 years 6 months ago
Evolving Behaviour Trees for the Commercial Game DEFCON
Abstract. Behaviour trees provide the possibility of improving on existing Artificial Intelligence techniques in games by being simple to implement, scalable, able to handle the c...
Chong-U Lim, Robin Baumgarten, Simon Colton