Sciweavers

391 search results - page 17 / 79
» als 2003
Sort
View
EMNLP
2007
13 years 9 months ago
Structural Correspondence Learning for Dependency Parsing
Following (Blitzer et al., 2006), we present an application of structural correspondence learning to non-projective dependency parsing (McDonald et al., 2005). To induce the corre...
Nobuyuki Shimizu, Hiroshi Nakagawa
MTDT
2003
IEEE
83views Hardware» more  MTDT 2003»
14 years 24 days ago
A Fault Primitive Based Analysis of Linked Faults in RAMs
: Linked faults are very important for memory testing because they reduce the fault coverage of the tests. Their analysis has proven to be a source for new memory tests, characteri...
Zaid Al-Ars, Said Hamdioui, A. J. van de Goor
FIMI
2003
170views Data Mining» more  FIMI 2003»
13 years 9 months ago
kDCI: a Multi-Strategy Algorithm for Mining Frequent Sets
This paper presents the implementation of kDCI, an enhancement of DCI [10], a scalable algorithm for discovering frequent sets in large databases. The main contribution of kDCI re...
Salvatore Orlando, Claudio Lucchese, Paolo Palmeri...
TPHOL
2003
IEEE
14 years 24 days ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
IJNSEC
2006
75views more  IJNSEC 2006»
13 years 7 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow