Sciweavers

5290 search results - page 808 / 1058
» Knowledge Processing in Intelligent Systems
Sort
View
89
Voted
SYNASC
2006
IEEE
91views Algorithms» more  SYNASC 2006»
15 years 6 months ago
MATHsAiD: A Mathematical Theorem Discovery Tool
In the eld of automated reasoning, one of the most challenging (even if, perhaps, somewhat overlooked) problems thus far has been to develop a means of discerning, from amongst al...
Roy L. McCasland, Alan Bundy
87
Voted
ISPW
2005
IEEE
15 years 6 months ago
Evolving Defect "Folklore": A Cross-Study Analysis of Software Defect Behavior
Abstract. Answering “macro-process” research issues – which require understanding how development processes fit or do not fit in different organizational systems and environm...
Victor R. Basili, Forrest Shull
GECCO
2009
Springer
109views Optimization» more  GECCO 2009»
15 years 5 months ago
A genetic algorithm for learning significant phrase patterns in radiology reports
Radiologists disagree with each other over the characteristics and features of what constitutes a normal mammogram and the terminology to use in the associated radiology report. R...
Robert M. Patton, Thomas E. Potok, Barbara G. Beck...
NLDB
2001
Springer
15 years 5 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst
106
Voted
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 4 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer