Sciweavers

948 search results - page 152 / 190
» How People use Words to Make Meanings
Sort
View
97
Voted
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 4 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
IIR
2010
15 years 2 months ago
Sentence-Based Active Learning Strategies for Information Extraction
Given a classifier trained on relatively few training examples, active learning (AL) consists in ranking a set of unlabeled examples in terms of how informative they would be, if ...
Andrea Esuli, Diego Marcheggiani, Fabrizio Sebasti...
SIAMJO
2008
114views more  SIAMJO 2008»
15 years 13 days ago
An Inexact SQP Method for Equality Constrained Optimization
We present an algorithm for large-scale equality constrained optimization. The method is based on a characterization of inexact sequential quadratic programming (SQP) steps that ca...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
99
Voted
SIAMJO
2008
85views more  SIAMJO 2008»
15 years 13 days ago
Explicit Reformulations for Robust Optimization Problems with General Uncertainty Sets
We consider a rather general class of mathematical programming problems with data uncertainty, where the uncertainty set is represented by a system of convex inequalities. We prove...
Igor Averbakh, Yun-Bin Zhao
110
Voted
USS
2010
14 years 10 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...