Sciweavers

215 search results - page 33 / 43
» Open Information Extraction Using Wikipedia
Sort
View
MSR
2009
ACM
14 years 6 days ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk
BMCBI
2004
94views more  BMCBI 2004»
13 years 7 months ago
The tissue microarray data exchange specification: implementation by the Cooperative Prostate Cancer Tissue Resource
Background: Tissue Microarrays (TMAs) have emerged as a powerful tool for examining the distribution of marker molecules in hundreds of different tissues displayed on a single sli...
Jules J. Berman, Milton Datta, Andre Kajdacsy-Ball...
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 2 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
ACSD
2005
IEEE
121views Hardware» more  ACSD 2005»
14 years 1 months ago
LusSy: A Toolbox for the Analysis of Systems-on-a-Chip at the Transactional Level
We describe a toolbox for the analysis of Systems-on-achip described in SystemC at the transactional level. The tools are able to extract information from SystemC code, and to bui...
Matthieu Moy, Florence Maraninchi, Laurent Maillet...
SOFTVIS
2005
ACM
14 years 1 months ago
Visual data mining in software archives
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
Michael Burch, Stephan Diehl, Peter Weißgerb...