Sciweavers

42230 search results - page 8411 / 8446
» Algorithms and Complexity Results for
Sort
View
EMNLP
2010
13 years 6 months ago
A New Approach to Lexical Disambiguation of Arabic Text
We describe a model for the lexical analysis of Arabic text, using the lists of alternatives supplied by a broad-coverage morphological analyzer, SAMA, which include stable lemma ...
Rushin Shah, Paramveer S. Dhillon, Mark Liberman, ...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 6 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
GLOBECOM
2010
IEEE
13 years 6 months ago
Automatic Gain Control for ADC-Limited Communication
As the date rates and bandwidths of communication systems scale up, the cost and power consumption of highprecision (e.g., 8-12 bits) analog-to-digital converters (ADCs) become pro...
Feifei Sun, Jaspreet Singh, Upamanyu Madhow
GROUP
2010
ACM
13 years 6 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
ICCAD
2010
IEEE
148views Hardware» more  ICCAD 2010»
13 years 6 months ago
Trace signal selection to enhance timing and logic visibility in post-silicon validation
Trace buffer technology allows tracking the values of a few number of state elements inside a chip within a desired time window, which is used to analyze logic errors during post-s...
Hamid Shojaei, Azadeh Davoodi
« Prev « First page 8411 / 8446 Last » Next »