Sciweavers

4650 search results - page 159 / 930
» Generating and evaluating evaluative arguments
Sort
View
JOC
2011
104views more  JOC 2011»
14 years 6 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
AUSAI
2011
Springer
14 years 3 months ago
Automatically Measuring the Quality of User Generated Content in Forums
The amount of user generated content on the Web is growing and identifying high quality content in a timely manner has become a problem. Many forums rely on its users to manually r...
Kevin Chai, Chen Wu, Vidyasagar Potdar, Pedram Hay...
MIDDLEWARE
2010
Springer
15 years 1 months ago
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories
Abstract. Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We ...
Alokika Dash, Brian Demsky
IACR
2011
182views more  IACR 2011»
14 years 2 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
EMNLP
2009
15 years 25 days ago
Generating High-Coverage Semantic Orientation Lexicons From Overtly Marked Words and a Thesaurus
Sentiment analysis often relies on a semantic orientation lexicon of positive and negative words. A number of approaches have been proposed for creating such lexicons, but they te...
Saif Mohammad, Cody Dunne, Bonnie J. Dorr