Sciweavers

2539 search results - page 254 / 508
» Debugging Method Names
Sort
View
PODS
2010
ACM
250views Database» more  PODS 2010»
15 years 8 months ago
From information to knowledge: harvesting entities and relationships from web sources
There are major trends to advance the functionality of search engines to a more expressive semantic level. This is enabled by the advent of knowledge-sharing communities such as W...
Gerhard Weikum, Martin Theobald
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
15 years 8 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin
OTM
2009
Springer
15 years 7 months ago
Automatic Construction of a Semantic, Domain-Independent Knowledge Base
In this paper, we want to show which difficulties arise when automatically constructing a domain-independent knowledge base from the web. We show possible applications for such a k...
David Urbansky
DIS
2001
Springer
15 years 7 months ago
Knowledge Navigation on Visualizing Complementary Documents
Abstract. It is an up-to-date challenge to get answers for novel questions which nobody has ever considered. Such a question is too rare to be satisfied with a past single documen...
Naohiro Matsumura, Yukio Ohsawa, Mitsuru Ishizuka
115
Voted
ECSQARU
2001
Springer
15 years 7 months ago
General Preferential Entailments as Circumscriptions
Abstract A (general) preferential entailment is defined by a “preference relation” among “states”. States can be either interpretations or sets of interpretations, or “c...
Yves Moinard