Sciweavers

1056 search results - page 49 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
EMNLP
2004
13 years 9 months ago
Automatic Paragraph Identification: A Study across Languages and Domains
In this paper we investigate whether paragraphs can be identified automatically in different languages and domains. We propose a machine learning approach which exploits textual a...
Caroline Sporleder, Mirella Lapata
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 9 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
TCSV
2008
103views more  TCSV 2008»
13 years 7 months ago
Frame Buffer Access Reduction for MPEG Video Decoder
Abstract--Frame buffer power consumption and bandwidth requirement are two critical design issues in MPEG video decoders due to the overwhelming amount of frame data accesses. This...
Wei-Cheng Lin, Chung-Ho Chen
ASIACRYPT
2010
Springer
13 years 5 months ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat
ECEASST
2010
13 years 2 months ago
Re-engineering Eclipse MDT/OCL for Xtext
The current tooling used for the Eclipse OCL project uses an LALR parser generator. Enhancing the tooling to support editing motivated a migration to exploit the inherently model-d...
Edward D. Willink