Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
In a supertagging task, sequence labeling models are commonly used. But their limited ability to model long-distance information presents a bottleneck to make further improvements...
Clustering is a branch of multivariate analysis that is used to create groups of data. While there are currently a variety of techniques that are used for creating clusters, many ...
Javier Bajo, Juan Francisco de Paz, Sara Rodr&iacu...
This paper describes the result of performance evaluation of two kinds of MapReduce applications running in the FutureGrid: a data intensive application and a computation intensive...
Abstract. In this work, we propose a method which can extract critical points on a face using both location and texture information. This new approach can automatically learn featu...
Mustafa Berkay Yilmaz, Hakan Erdogan, Mustafa Unel