Sciweavers

2774 search results - page 473 / 555
» Exploiting Deep Structure
Sort
View
ACL
2009
15 years 2 months ago
Better Word Alignments with Supervised ITG Models
This work investigates supervised word alignment methods that exploit inversion transduction grammar (ITG) constraints. We consider maximum margin and conditional likelihood objec...
Aria Haghighi, John Blitzer, John DeNero, Dan Klei...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 1 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
ECIR
2009
Springer
15 years 1 months ago
PathRank: Web Page Retrieval with Navigation Path
Abstract. This paper describes a path-based method to use the multi-step navigation information discovered from website structures for web page ranking. Use of hyperlinks to enhanc...
Jianqiang Li, Yu Zhao 0002
GI
2009
Springer
15 years 1 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson
GLVLSI
2009
IEEE
262views VLSI» more  GLVLSI 2009»
15 years 1 months ago
Power distribution paths in 3-D ICS
Distributing power and ground to a vertically integrated system is a complex and difficult task. Interplane communication and power delivery are achieved by through silicon vias (...
Vasilis F. Pavlidis, Giovanni De Micheli