Sciweavers

16513 search results - page 2914 / 3303
» Numerical Analysis Methods
Sort
View
AUSAI
2004
Springer
15 years 10 months ago
BayesTH-MCRDR Algorithm for Automatic Classification of Web Document
Nowadays, automated Web document classification is considered as an important method to manage and process an enormous amount of Web documents in digital forms that are extensive a...
Woo-Chul Cho, Debbie Richards
118
Voted
CAISE
2004
Springer
15 years 10 months ago
Towards Computer-aided Design of OCL Constraints
In UML2.0, significant efforts have been devoted towards a better definition of OCL. Still, the adoption of the language by the software engineers remains a significant challenge....
Yves Ledru, Sophie Dupuy-Chessa, Hind Fadil
147
Voted
CAV
2004
Springer
123views Hardware» more  CAV 2004»
15 years 10 months ago
SAL 2
SAL 2 augments the specification language and explicit-state model checker of SAL 1 with high-performance symbolic and bounded model checkers, and with novel infinite bounded and...
Leonardo Mendonça de Moura, Sam Owre, Haral...
CEAS
2004
Springer
15 years 10 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
145
Voted
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 10 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
« Prev « First page 2914 / 3303 Last » Next »