Sciweavers

1579 search results - page 66 / 316
» How Good is the Crowd at
Sort
View
ECML
2005
Springer
14 years 1 months ago
Learning (k, l)-Contextual Tree Languages for Information Extraction
This paper introduces a novel method for learning a wrapper for extraction of information from web pages, based upon (k,l)-contextual tree languages. It also introduces a method to...
Stefan Raeymaekers, Maurice Bruynooghe, Jan Van de...
UC
2005
Springer
14 years 1 months ago
Using Genetic Algorithms to Evolve Behavior in Cellular Automata
Abstract. It is an unconventional computation approach to evolve solutions instead of calculating them. Although using evolutionary computation in computer science dates back to th...
Thomas Bäck, Ron Breukelaar
FC
2003
Springer
125views Cryptology» more  FC 2003»
14 years 1 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
ASYNC
2002
IEEE
123views Hardware» more  ASYNC 2002»
14 years 1 months ago
Improving Smart Card Security Using Self-Timed Circuits
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructing smart card functions that are resistant to side channel attacks and fault in...
Simon W. Moore, Robert D. Mullins, Paul A. Cunning...
SRDS
2000
IEEE
14 years 15 days ago
Using Multicast Communication to Reduce Deadlock in Replicated Databases
Obtaining good performance from a distributed replicated database that allows update transactions to originate at any site while ensuring one-copy serializability is a challenge. ...
JoAnne Holliday, Divyakant Agrawal, Amr El Abbadi