Sciweavers

2157 search results - page 379 / 432
» Binary ant algorithm
Sort
View
DGO
2007
152views Education» more  DGO 2007»
13 years 10 months ago
Identifying and classifying subjective claims
To understand the subjective documents, for example, public comments on the government’s proposed regulation, opinion identification and classification is required. Rather than ...
Namhee Kwon, Liang Zhou, Eduard H. Hovy, Stuart W....
EISWT
2007
13 years 10 months ago
Schema Based XML Compression
XML has grown into a widely used and highly developed technology, due in part to the subcomponents built around the technology (advanced parsers, frameworks, libraries, etc). The ...
Naphtali Rishe, Ouri Wolfson, Ben Wongsaroj, Damia...
MEDIAFORENSICS
2010
13 years 10 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
ISSA
2008
13 years 10 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
PDCN
2007
13 years 10 months ago
Design and evaluation of an auto-memoization processor
This paper describes the design and evaluation of an auto-memoization processor. The major point of this proposal is to detect the multilevel functions and loops with no additiona...
Tomoaki Tsumura, Ikuma Suzuki, Yasuki Ikeuchi, Hir...