Sciweavers

345 search results - page 57 / 69
» A construction of a space-time code based on number theory
Sort
View
ESWA
2007
151views more  ESWA 2007»
13 years 7 months ago
A novel feature selection algorithm for text categorization
With the development of the web, large numbers of documents are available on the Internet. Digital libraries, news sources and inner data of companies surge more and more. Automat...
Wenqian Shang, Houkuan Huang, Haibin Zhu, Yongmin ...
COGSCI
2002
83views more  COGSCI 2002»
13 years 7 months ago
Strategies in sentential reasoning
Four experiments examined the strategies that individuals develop in sentential reasoning. They led to the discovery of five different strategies. According to the theory proposed...
Jean-Baptiste Van der Henst, Yingrui Yang, Philip ...
SIAMNUM
2010
129views more  SIAMNUM 2010»
13 years 2 months ago
Convergence of an Adaptive Finite Element Method for Controlling Local Energy Errors
A number of works concerning rigorous convergence theory for adaptive finite element methods (AFEM) for controlling global energy errors have appeared in recent years. However, man...
Alan Demlow
CCS
2010
ACM
13 years 7 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan