Sciweavers

272 search results - page 21 / 55
» Dependability Analysis: A New Application for Run-Time Recon...
Sort
View
AAIM
2009
Springer
101views Algorithms» more  AAIM 2009»
14 years 2 months ago
Orca Reduction and ContrAction Graph Clustering
During the last years, a wide range of huge networks has been made available to researchers. The discovery of natural groups, a task called graph clustering, in such datasets is a ...
Daniel Delling, Robert Görke, Christian Schul...
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 27 days ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
JCNS
2010
104views more  JCNS 2010»
13 years 5 months ago
A new look at state-space models for neural data
State space methods have proven indispensable in neural data analysis. However, common methods for performing inference in state-space models with non-Gaussian observations rely o...
Liam Paninski, Yashar Ahmadian, Daniel Gil Ferreir...
ERSA
2008
93views Hardware» more  ERSA 2008»
13 years 8 months ago
Multiparadigm Computing for Space-Based Synthetic Aperture Radar
Projected computational requirements for future space missions are outpacing technologies and trends in conventional embedded microprocessors. In order to meet the necessary levels...
Adam Jacobs, Grzegorz Cieslewski, Casey Reardon, A...