Sciweavers

3639 search results - page 597 / 728
» Provenance as Dependency Analysis
Sort
View
97
Voted
ERCIMDL
2008
Springer
107views Education» more  ERCIMDL 2008»
15 years 2 months ago
Revisiting Lexical Signatures to (Re-)Discover Web Pages
A lexical signature (LS) is a small set of terms derived from a document that capture the "aboutness" of that document. A LS generated from a web page can be used to disc...
Martin Klein, Michael L. Nelson
112
Voted
EVOW
2008
Springer
15 years 2 months ago
Architecture Performance Prediction Using Evolutionary Artificial Neural Networks
The design of computer architectures requires the setting of multiple parameters on which the final performance depends. The number of possible combinations make an extremely huge ...
Pedro A. Castillo, Antonio Miguel Mora, Juan Juli&...
EWCBR
2008
Springer
15 years 2 months ago
iReMedI- Intelligent Retrieval from Medical Information
Abstract. Effective encoding of information is one of the keys to qualitative problem solving. Our aim is to explore Knowledge representation techniques that capture meaningful wor...
Saurav Sahay, Bharat Ravisekar, Sundaresan Venkata...
106
Voted
FPL
2008
Springer
157views Hardware» more  FPL 2008»
15 years 2 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...
ISSRE
2007
IEEE
15 years 2 months ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry