Sciweavers

15351 search results - page 2954 / 3071
» The information bottleneck method
Sort
View
LOCA
2007
Springer
14 years 4 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
PEPM
2007
ACM
14 years 4 months ago
Bidirectional interpretation of XQuery
XQuery is a powerful functional language to query XML data. This paper presents a bidirectional interpretation of XQuery to address the problem of updating XML data through materi...
Dongxi Liu, Zhenjiang Hu, Masato Takeichi
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 4 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
TSD
2007
Springer
14 years 4 months ago
Accurate Unlexicalized Parsing for Modern Hebrew
Many state-of-the-art statistical parsers for English can be viewed as Probabilistic Context-Free Grammars (PCFGs) acquired from treebanks consisting of phrase-structure trees enri...
Reut Tsarfaty, Khalil Sima'an
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 4 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
« Prev « First page 2954 / 3071 Last » Next »