Sciweavers

5234 search results - page 216 / 1047
» Method Components - Rationale Revealed
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
165
Voted
NN
2007
Springer
267views Neural Networks» more  NN 2007»
15 years 3 months ago
Modeling of gene regulatory networks with hybrid differential evolution and particle swarm optimization
In the last decade, recurrent neural networks (RNNs) have attracted more efforts in inferring genetic regulatory networks (GRNs), using time series gene expression data from micro...
Rui Xu, Ganesh K. Venayagamoorthy, Donald C. Wunsc...
117
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Sharing the cost of backbone networks: Simplicity vs. precision
—Internet backbone operators face a trade-off in quantifying the costs that their customers inflict on their infrastructure since the precision of these methods depends on the r...
László Gyarmati, Michael Sirivianos,...
82
Voted
WISE
2005
Springer
15 years 9 months ago
Mining Communities on the Web Using a Max-Flow and a Site-Oriented Framework
There are several methods for mining communities on the Web using hyperlinks. One of the well-known ones is a max-flow based method proposed by Flake et al. The method adopts a pa...
Yasuhito Asano, Takao Nishizeki, Masashi Toyoda
JAPLL
2007
101views more  JAPLL 2007»
15 years 3 months ago
Data-driven type checking in open domain question answering
Many open domain question answering systems answer questions by first harvesting a large number of candidate answers, and then picking the most promising one from the list. One c...
Stefan Schlobach, David Ahn, Maarten de Rijke, Val...