Sciweavers

2237 search results - page 351 / 448
» On the Security of Random Sources
Sort
View
NCA
2007
IEEE
15 years 4 months ago
A Topological Analysis of Monitor Placement
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
AUSDM
2007
Springer
100views Data Mining» more  AUSDM 2007»
15 years 4 months ago
Predictive Model of Insolvency Risk for Australian Corporations
This paper describes the development of a predictive model for corporate insolvency risk in Australia. The model building methodology is empirical with out-ofsample future year te...
Rohan A. Baxter, Mark Gawler, Russell Ang
INEX
2007
Springer
15 years 4 months ago
Structured Document Retrieval, Multimedia Retrieval, and Entity Ranking Using PF/Tijah
CWI and University of Twente used PF/Tijah, a flexible XML retrieval system, to evaluate structured document retrieval, multimedia retrieval, and entity ranking tasks in the conte...
Theodora Tsikrika, Pavel Serdyukov, Henning Rode, ...
PKDD
2007
Springer
141views Data Mining» more  PKDD 2007»
15 years 4 months ago
Automatic Hidden Web Database Classification
In this paper, a method for automatic classification of Hidden-Web databases is addressed. In our approach, the classification tree for Hidden Web databases is constructed by tailo...
Zhiguo Gong, Jingbai Zhang, Qian Liu
DATE
2006
IEEE
108views Hardware» more  DATE 2006»
15 years 4 months ago
Lens aberration aware timing-driven placement
Process variations due to lens aberrations are to a large extent systematic, and can be modeled for purposes of analyses and optimizations in the design phase. Traditionally, vari...
Andrew B. Kahng, Chul-Hong Park, Puneet Sharma, Qi...