Sciweavers

16070 search results - page 197 / 3214
» Identifying
Sort
View
APSCC
2008
IEEE
15 years 6 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
CCS
2008
ACM
15 years 6 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
RECOMB
2010
Springer
15 years 6 months ago
Subnetwork State Functions Define Dysregulated Subnetworks in Cancer
Abstract. Emerging research demonstrates the potential of proteinprotein interaction (PPI) networks in uncovering the mechanistic bases of cancers, through identification of intera...
Salim A. Chowdhury, Rod K. Nibbe, Mark R. Chance, ...
95
Voted
LREC
2010
126views Education» more  LREC 2010»
15 years 6 months ago
Exploiting Scope for Shallow Discourse Parsing
We present an approach to automatically identifying the arguments of discourse connectives based on data from the Penn Discourse Treebank. Of the two arguments of connectives, cal...
Rashmi Prasad, Aravind K. Joshi, Bonnie L. Webber
LREC
2010
251views Education» more  LREC 2010»
15 years 6 months ago
Extracting Product Features and Sentiments from Chinese Customer Reviews
With the growing interest in opinion mining from web data, more works are focused on mining in English and Chinese reviews. Probing into the problem of product opinion mining, thi...
Shu Zhang, Wen-Jie Jia, Yingju Xia, Yao Meng, Hao ...