Sciweavers

10458 search results - page 1936 / 2092
» Modeling Features at Runtime
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 6 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
CSE
2009
IEEE
13 years 6 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
DLS
2009
182views Languages» more  DLS 2009»
13 years 6 months ago
Context-oriented software transactional memory in common lisp
Software transactional memory (STM) is a promising approach for coordinating concurrent threads, for which many implementation strategies are currently being researched. Although ...
Pascal Costanza, Charlotte Herzeel, Theo D'Hondt
EMNLP
2009
13 years 6 months ago
Review Sentiment Scoring via a Parse-and-Paraphrase Paradigm
This paper presents a parse-and-paraphrase paradigm to assess the degrees of sentiment for product reviews. Sentiment identification has been well studied; however, most previous ...
Jingjing Liu, Stephanie Seneff
GIL
2009
13 years 6 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
« Prev « First page 1936 / 2092 Last » Next »