Sciweavers

717 search results - page 120 / 144
» The effect of negation on sentiment analysis and retrieval e...
Sort
View
ICCCN
2007
IEEE
14 years 2 months ago
Infrastructure for Cross-Layer Designs Interaction
Abstract—The current system design of mobile ad hoc networks (MANET), derived from their traditional fixed counterparts, cannot fully meet the requirements inherent to the dynam...
Zhijiang Chang, Georgi Gaydadjiev, Stamatis Vassil...
ISPD
2004
ACM
189views Hardware» more  ISPD 2004»
14 years 1 months ago
Almost optimum placement legalization by minimum cost flow and dynamic programming
VLSI placement tools usually work in two steps: First, the cells that have to be placed are roughly spread out over the chip area ignoring disjointness (global placement). Then, i...
Ulrich Brenner, Anna Pauli, Jens Vygen
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 1 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Mining Medical Specialist Billing Patterns for Health Service Management
This paper presents an application of association rule mining in compliance in the context of health service management. There are approximately 500 million transactions processed...
Yin Shan, David Jeacocke, D. Wayne Murray, Alison ...
BMCBI
2010
111views more  BMCBI 2010»
13 years 8 months ago
Comparative performances of DNA barcoding across insect orders
Background: Previous studies on insect DNA barcoding provide contradictory results and suggest not consistent performances across orders. This work aims at providing a general eva...
Massimiliano Virgilio, Thierry Backeljau, Bruno Ne...