Sciweavers

4050 search results - page 649 / 810
» Information Extraction from Voicemail
Sort
View
ASPDAC
2008
ACM
106views Hardware» more  ASPDAC 2008»
13 years 10 months ago
Verifying full-custom multipliers by Boolean equivalence checking and an arithmetic bit level proof
—In this paper we describe a practical methodology to formally verify highly optimized, industrial multipliers. We a multiplier description language which abstracts from low-leve...
Udo Krautz, Markus Wedler, Wolfgang Kunz, Kai Webe...
IAT
2007
IEEE
13 years 9 months ago
Similarity-Based Fuzzy Clustering for User Profiling
User profiling is a fundamental task in Web personalization. Fuzzy clustering is a valid approach to derive user profiles by capturing similar user interests from web usage data a...
Giovanna Castellano, Anna Maria Fanelli, Corrado M...
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 9 months ago
Is It Real, or Is It Randomized?: A Financial Turing Test
We construct a financial "Turing test" to determine whether human subjects can differentiate between actual vs. randomized financial returns. The experiment consists of ...
Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 9 months ago
Key Distillation and the Secret-Bit Fraction
We consider distillation of secret bits from partially secret noisy correlations PABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario...
Nick S. Jones, Lluis Masanes
JCIT
2008
165views more  JCIT 2008»
13 years 9 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen