Sciweavers

1262 search results - page 57 / 253
» Generating instruction sets and microarchitectures from appl...
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 9 months ago
Evaluation of Query Generators for Entity Search Engines
Dynamic web applications such as mashups need efficient access to web data that is only accessible via entity search engines (e.g. product or publication search engines). However,...
Stefan Endrullis, Andreas Thor, Erhard Rahm
SP
2008
IEEE
14 years 3 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 3 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
TKDE
2002
133views more  TKDE 2002»
13 years 8 months ago
Binary Rule Generation via Hamming Clustering
The generation of a set of rules underlying a classification problem is performed by applying a new algorithm, called Hamming Clustering (HC). It reconstructs the and-or expressio...
Marco Muselli, Diego Liberati
EACL
1993
ACL Anthology
13 years 10 months ago
Linguistic Knowledge Acquisition from Parsing Failures
A semi-automatic procedure of linguistic knowledge acquisition is proposed, which combines corpus-based techniques with the conventional rule-based approach. The rule-based compon...
Masaki Kiyono, Jun-ichi Tsujii