Sciweavers

1328 search results - page 150 / 266
» Stacked Generalization for Information Extraction
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 2 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
JCDL
2003
ACM
231views Education» more  JCDL 2003»
14 years 1 months ago
Acquisition, Representation, Query and Analysis of Spatial Data: A Demonstration 3D Digital Library
The increasing power of techniques to model complex geometry and extract meaning from 3D information create complex data that must be described, stored, and displayed to be useful...
Jeremy Rowe, Anshuman Razdan, Arleyn Simon
JMM2
2006
151views more  JMM2 2006»
13 years 8 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 8 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
WWW
2002
ACM
14 years 8 months ago
Probabilistic question answering on the web
Web-based search engines such as Google and NorthernLight return documents that are relevant to a user query, not answers to user questions. We have developed an architecture that...
Dragomir R. Radev, Weiguo Fan, Hong Qi, Harris Wu,...