Sciweavers

2176 search results - page 354 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
120
Voted
SAC
2004
ACM
15 years 8 months ago
Classifying biological articles using web resources
Text classification systems on biomedical literature aim to select relevant articles to a specific issue from large corpora. Most systems with an acceptable accuracy are based o...
Francisco M. Couto, Bruno Martins, Mário J....
AFP
2004
Springer
128views Formal Methods» more  AFP 2004»
15 years 8 months ago
GEC: A Toolkit for Generic Rapid Prototyping of Type Safe Interactive Applications
Abstract. Programming GUIs with conventional GUI APIs is notoriously tedious. In these notes we present the GEC toolkit in which the programmer can create user interfaces without a...
Peter Achten, Marko C. J. D. van Eekelen, Rinus Pl...
ISMIR
2004
Springer
90views Music» more  ISMIR 2004»
15 years 8 months ago
Automatic extraction of music descriptors from acoustic signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the f...
François Pachet, Aymeric Zils
MCS
2004
Springer
15 years 8 months ago
An Empirical Comparison of Hierarchical vs. Two-Level Approaches to Multiclass Problems
The ECOC framework provides a powerful and popular method for solving multiclass problems using a multitude of binary classifiers. We had recently introduced the Binary Hierarchica...
Suju Rajan, Joydeep Ghosh
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 8 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...