Sciweavers

754 search results - page 107 / 151
» Generation of Signatures by Deformations
Sort
View
ENTCS
2010
90views more  ENTCS 2010»
13 years 7 months ago
Recursive Program Schemes and Context-Free Monads
Solutions of recursive program schemes over a given signature were characterized by Bruno Courcelle as precisely the context-free (or algebraic) -trees. These are the finite and ...
Jirí Adámek, Stefan Milius, Jiri Vel...
AAECC
2004
Springer
76views Algorithms» more  AAECC 2004»
13 years 7 months ago
On the Security of RSA with Primes Sharing Least-Significant Bits
Abstract. We investigate the security of a variant of the RSA public-key cryptosystem called LSBS-RSA, in which the modulus primes share a large number of least-significant bits.We...
Ron Steinfeld, Yuliang Zheng
COLING
2002
13 years 7 months ago
Fine Grained Classification of Named Entities
While Named Entity extraction is useful in many natural language applications, the coarse categories that most NE extractors work with prove insufficient for complex applications ...
Michael Fleischman, Eduard H. Hovy
TVLSI
2002
121views more  TVLSI 2002»
13 years 7 months ago
On-chip decoupling capacitor optimization using architectural level prediction
Switching activity-generated power-supply grid-noise presents a major obstacle to the reduction of supply voltage in future generation semiconductor technologies. A popular techniq...
Mondira Deb Pant, Pankaj Pant, D. Scott Wills
MICCAI
2005
Springer
14 years 8 months ago
Synthetic Ground Truth for Validation of Brain Tumor MRI Segmentation
Validation and method of comparison for segmentation of magnetic resonance images (MRI) presenting pathology is a challenging task due to the lack of reliable ground truth. We prop...
Marcel Prastawa, Elizabeth Bullitt, Guido Gerig