Sciweavers

8031 search results - page 1438 / 1607
» Knowledge and Workflow Systems
Sort
View
JDIM
2010
156views more  JDIM 2010»
14 years 5 months ago
Rule based Autonomous Citation Mining with TIERL
: Citations management is an important task in managing digital libraries. Citations provide valuable information e.g., used in evaluating an author's influences or scholarly ...
Muhammad Tanvir Afzal, Hermann A. Maurer, Wolf-Til...
103
Voted
JIPS
2010
165views more  JIPS 2010»
14 years 5 months ago
IMTAR: Incremental Mining of General Temporal Association Rules
Nowadays due to the rapid advances in the field of information systems, transactional databases are being updated regularly and/or periodically. The knowledge discovered from these...
Anour F. A. Dafa-Alla, Ho-Sun Shon, Khalid E. K. S...
96
Voted
JOC
2010
92views more  JOC 2010»
14 years 5 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
128
Voted
SBMF
2010
Springer
205views Formal Methods» more  SBMF 2010»
14 years 5 months ago
A High-Level Language for Modeling Algorithms and Their Properties
Designers of concurrent and distributed algorithms usually express them using pseudo-code. In contrast, most verification techniques are based on more mathematically-oriented forma...
Sabina Akhtar, Stephan Merz, Martin Quinson
TASLP
2010
96views more  TASLP 2010»
14 years 5 months ago
Evaluating Source Separation Algorithms With Reverberant Speech
This paper examines the performance of several source separation systems on a speech separation task for which human intelligibility has previously been measured. For anechoic mixt...
Michael I. Mandel, S. Bressler, Barbara G. Shinn-C...
« Prev « First page 1438 / 1607 Last » Next »