Sciweavers

381 search results - page 63 / 77
» Overview of WebCLEF 2006
Sort
View
CHES
2006
Springer
124views Cryptology» more  CHES 2006»
13 years 11 months ago
A Proposition for Correlation Power Analysis Enhancement
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (...
Thanh-Ha Le, Jessy Clédière, C&eacut...
CICLING
2006
Springer
13 years 11 months ago
Creating a Testbed for the Evaluation of Automatically Generated Back-of-the-Book Indexes
The automatic generation of back-of-the book indexes seems to be out of sight of the Information Retrieval and Natural Language Processing communities, although the increasingly la...
Andras Csomai, Rada Mihalcea
E4MAS
2006
Springer
13 years 11 months ago
A Reference Architecture for Situated Multiagent Systems
Abstract. A reference architecture integrates a set of architectural patterns that have proven their value for a family of applications. Such family of applications is characterize...
Danny Weyns, Tom Holvoet
EDBTW
2006
Springer
13 years 11 months ago
Implementing a Linguistic Query Language for Historic Texts
Abstract. We describe design and implementation of the linguistic query language DDDquery. This language aims at querying a large linguistic database storing a corpus of richly ann...
Lukas Faulstich, Ulf Leser, Thorsten Vitt
EDO
2006
Springer
13 years 11 months ago
Tailoring an architectural middleware platform to a heterogeneous embedded environment
Embedded systems are rapidly growing in size, complexity, distribution, and heterogeneity. As a result, the traditional practice of developing one-off embedded applications that a...
Sam Malek, Chiyoung Seo, Nenad Medvidovic