Sciweavers

349 search results - page 35 / 70
» Generating Lexical Analogies Using Dependency Relations
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
IPPS
2006
IEEE
14 years 1 months ago
Instability in parallel job scheduling simulation: the role of workload flurries
The performance of computer systems depends, among other things, on the workload. This motivates the use of real workloads (as recorded in activity logs) to drive simulations of n...
Dan Tsafrir, Dror G. Feitelson
ACL
1992
13 years 9 months ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
COMBINATORICS
2004
96views more  COMBINATORICS 2004»
13 years 7 months ago
Conjectured Combinatorial Models for the Hilbert Series of Generalized Diagonal Harmonics Modules
Haglund and Loehr previously conjectured two equivalent combinatorial formulas for the Hilbert series of the Garsia-Haiman diagonal harmonics modules. These formulas involve weigh...
Nicholas A. Loehr, Jeffrey B. Remmel
ACL
2009
13 years 5 months ago
A Novel Discourse Parser Based on Support Vector Machine Classification
This paper introduces a new algorithm to parse discourse within the framework of Rhetorical Structure Theory (RST). Our method is based on recent advances in the field of statisti...
David duVerle, Helmut Prendinger