Sciweavers

797 search results - page 108 / 160
» Observing Success in the Pi-Calculus
Sort
View
NAACL
2010
14 years 7 months ago
Training Paradigms for Correcting Errors in Grammar and Usage
This paper proposes a novel approach to the problem of training classifiers to detect and correct grammar and usage errors in text by selectively introducing mistakes into the tra...
Alla Rozovskaya, Dan Roth
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
ECRTS
2009
IEEE
14 years 7 months ago
Approximate Bandwidth Allocation for Compositional Real-Time Systems
Allocation of bandwidth among components is a fundamental problem in compositional real-time systems. Stateof-the-art algorithms for bandwidth allocation use either exponential-ti...
Nathan Fisher, Farhana Dewan
ICDAR
2009
IEEE
14 years 7 months ago
Analysis of Book Documents' Table of Content Based on Clustering
Table of contents (TOC) recognition has attracted a great deal of attention in recent years. After reviewing the merits and drawbacks of the existing TOC recognition methods, we h...
Liangcai Gao, Zhi Tang, Xiaofan Lin, Xin Tao, Yimi...
CORR
2011
Springer
176views Education» more  CORR 2011»
14 years 4 months ago
Matched Filtering from Limited Frequency Samples
In this paper, we study a simple correlation-based strategy for estimating the unknown delay and amplitude of a signal based on a small number of noisy, randomly chosen frequency-...
Armin Eftekhari, Justin K. Romberg, Michael B. Wak...