Sciweavers

918 search results - page 148 / 184
» Using Predicate-Argument Structures for Information Extracti...
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
GI
2009
Springer
14 years 7 months ago
Coarse graining of an individual-based plant model
: The evolution and structuring of plant communities is governed by local plant-to-plant interaction. It has been shown that the individual variability of the organisms and the spa...
Johannes Hoefener, Lars Rudolf, Uta Berger, Thilo ...
CVPR
2008
IEEE
15 years 11 months ago
Geo-spatial aerial video processing for scene understanding and object tracking
This paper presents an approach to extracting and using semantic layers from low altitude aerial videos for scene understanding and object tracking. The input video is captured by...
Jiangjian Xiao, Hui Cheng, Feng Han, Harpreet S. S...
ASPDAC
2008
ACM
106views Hardware» more  ASPDAC 2008»
14 years 10 months ago
Verifying full-custom multipliers by Boolean equivalence checking and an arithmetic bit level proof
—In this paper we describe a practical methodology to formally verify highly optimized, industrial multipliers. We a multiplier description language which abstracts from low-leve...
Udo Krautz, Markus Wedler, Wolfgang Kunz, Kai Webe...
IJHIS
2006
95views more  IJHIS 2006»
14 years 9 months ago
A hybrid system for concept-based web usage mining
A web site should be easy to browse by visitors. However, sometimes the reality is quite different. Situations like several unrelated topics in a single web page may lead to confus...
Sebastián A. Ríos, Juan D. Vel&aacut...