Sciweavers

4650 search results - page 159 / 930
» Generating and evaluating evaluative arguments
Sort
View
JOC
2011
104views more  JOC 2011»
13 years 1 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
AUSAI
2011
Springer
12 years 10 months ago
Automatically Measuring the Quality of User Generated Content in Forums
The amount of user generated content on the Web is growing and identifying high quality content in a timely manner has become a problem. Many forums rely on its users to manually r...
Kevin Chai, Chen Wu, Vidyasagar Potdar, Pedram Hay...
MIDDLEWARE
2010
Springer
13 years 8 months ago
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories
Abstract. Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We ...
Alokika Dash, Brian Demsky
IACR
2011
182views more  IACR 2011»
12 years 9 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
EMNLP
2009
13 years 8 months ago
Generating High-Coverage Semantic Orientation Lexicons From Overtly Marked Words and a Thesaurus
Sentiment analysis often relies on a semantic orientation lexicon of positive and negative words. A number of approaches have been proposed for creating such lexicons, but they te...
Saif Mohammad, Cody Dunne, Bonnie J. Dorr