Sciweavers

1287 search results - page 197 / 258
» Effective Performance Measurement at Petascale Using IPM
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
BIBE
2001
IEEE
188views Bioinformatics» more  BIBE 2001»
15 years 1 months ago
Interrelated Two-way Clustering: An Unsupervised Approach for Gene Expression Data Analysis
DNA arrays can be used to measure the expression levels of thousands of genes simultaneously. Currently most research focuses on the interpretation of the meaning of the data. How...
Chun Tang, Li Zhang, Aidong Zhang, Murali Ramanath...
ICDAR
2007
IEEE
14 years 11 months ago
Example-Based Logical Labeling of Document Title Page Images
This paper presents a flexible and effective examplebased approach for labeling title pages which can be used for automated extraction of bibliographic data. The labels of intere...
Joost van Beusekom, Daniel Keysers, Faisal Shafait...
COLING
2008
14 years 11 months ago
Extending a Thesaurus with Words from Pan-Chinese Sources
In this paper, we work on extending a Chinese thesaurus with words distinctly used in various Chinese communities. The acquisition and classification of such region-specific lexic...
Oi Yee Kwong, Benjamin Ka-Yin T'sou
EMNLP
2008
14 years 11 months ago
Selecting Sentences for Answering Complex Questions
Complex questions that require inferencing and synthesizing information from multiple documents can be seen as a kind of topicoriented, informative multi-document summarization. I...
Yllias Chali, Shafiq R. Joty