scispace - formally typeset
Search or ask a question
Institution

NEC

CompanyTokyo, Japan
About: NEC is a company organization based out in Tokyo, Japan. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 33269 authors who have published 57670 publications receiving 835952 citations. The organization is also known as: NEC Corporation & NEC Electronics Corporation.


Papers
More filters
Patent
30 Mar 2001
TL;DR: This paper proposed a method for retrieving answers to questions from an information retrieval system, which involves automatically learning phrase features for classifying questions into different types, automatically generating candidate query transformations from a training set of question/answer pairs, and automatically evaluating the candidate transforms on information retrieval systems.
Abstract: The invention is a method for retrieving answers to questions from an information retrieval system. The method involves automatically learning phrase features for classifying questions into different types, automatically generating candidate query transformations from a training set of question/answer pairs, and automatically evaluating the candidate transforms on information retrieval systems. At run time, questions are transformed into a set of queries, and re-ranking is performed on the documents retrieved.

112 citations

Journal ArticleDOI
Hidekazu Sakagami1, Tomonari Kamba1
01 Sep 1997
TL;DR: By mixing explicit feedback with implicit feedback, the system could personalize newspapers quickly and precisely without requiring too much effort on the part of the users, and the proposed technique for learning user preferences greatly enhances the value of the WWW.
Abstract: This paper discusses methods by which user preferences for WWW-based newspaper articles can be learned from user behaviors. Two modes of inference were compared in an experiment: one using explicit feedback and the other using implicit feedback. In the explicit feedback mode, the users score all articles according to their relevance. In the implicit feedback mode, the user reads articles by performing scrolling and enlarging operations, and the system infers from the operations how much the user was interested in each article. Our newspaper on the WWW, called ANATAGONOMY, has a learning engine and a scoring engine on the server. The system users read daily news articles by using a WWW browser in which there is an interaction agent that monitors the user behaviors. The learning engine on the server infers user preferences from the interaction agent, and the scoring engine scores new articles and creates personalized newspaper pages based on the extracted user profiles. In an experiment, the system was able to personalize the newspaper to some extent when using only implicit feedback when some parameters were properly set, but the personalization was not as precise as it was when explicit feedback was used. By mixing explicit feedback with implicit feedback, the system could personalize newspapers quickly and precisely without requiring too much effort on the part of the users. User preferences can also be used to construct information retrieval agents or even to create cyberspace communities of the users that have similar interests. We think that the proposed technique for learning user preferences greatly enhances the value of the WWW.

112 citations

Patent
N. Tanabe1
22 Oct 1993
TL;DR: In this article, the memory elements are disposed in a matrix such that they are spaced across and along the word lines and paired memory elements whose switching transistors have drains connected to the same bit line are positioned symmetrically with respect to the reference word line.
Abstract: A plurality of word lines extend linearly and parallel to each other. A reference word line is positioned to divide the word lines into two groups of word lines. A plurality of bit lines are folded on the reference word line symmetrically with respect to the reference word line and spaced at intervals from each other. Each of memory elements comprises a capacitive element and a switching transistor having a source connected to the capacitive element, a drain connected to one of the bit lines, and a gate connected to one of the word lines. The memory elements are disposed in a matrix such that they are spaced across and along the word lines and paired memory elements whose switching transistors have drains connected to the same bit line are positioned symmetrically with respect to the reference word line.

112 citations

Proceedings ArticleDOI
10 Nov 2002
TL;DR: It is demonstrated that the number of custom instruction candidates grows rapidly with program size, leading to a large design space, and that the quality (speedup) of custom instructions varies significantly across this space, motivating the need for the proposed flow.
Abstract: Efficiency and flexibility are critical, but often conflicting, design goals in embedded system design. The recent emergence of extensible processors promises a favorable tradeoff between efficiency and flexibility, while keeping design turnaround times short. Current extensible processor design flows automate several tedious tasks, but typically require designers to manually select the parts of the program that are to be implemented as custom instructions.In this work, we describe an automatic methodology to select custom instructions to augment an extensible processor, in order to maximize its efficiency for a given application program. We demonstrate that the number of custom instruction candidates grows rapidly with program size, leading to a large design space, and that the quality (speedup) of custom instructions varies significantly across this space, motivating the need for the proposed flow. Our methodology features cost functions to guide the custom instruction selection process, as well as static and dynamic pruning techniques to eliminate inferior parts of the design space from consideration. Further, we employ a two-stage process, wherein a limited number of promising instruction candidates are first selected, and then evaluated in more detail through cycle-accurate instruction set simulation and synthesis of the corresponding hardware, to identify the custom instruction combinations that result in the highest program speedup or maximize speedup under a given area constraint.We have evaluated the proposed techniques using a state-of-the-art extensible processor platform, in the context of a commercial design flow. Experiments with several benchmark programs indicate that custom processors synthesized using automatic custom instruction selection can result in large improvements in performance (upto 5.4X, average of 3.4X), energy (upto 4.5X, average of 3.2X), and energy-delay product (upto 24.2X, average of 12.6X), while speeding up the design process significantly.

112 citations

Journal ArticleDOI
TL;DR: This article proposes a usage control (UCON) based security framework for collaborative applications, by following a layered approach with policy, enforcement, and implementation models, called the PEI framework.
Abstract: Collaborative systems such as Grids provide efficient and scalable access to distributed computing capabilities and enable seamless resource sharing between users and platforms. This heterogeneous distribution of resources and the various modes of collaborations that exist between users, virtual organizations, and resource providers require scalable, flexible, and fine-grained access control to protect both individual and shared computing resources. In this article we propose a usage control (UCON) based security framework for collaborative applications, by following a layered approach with policy, enforcement, and implementation models, called the PEI framework. In the policy model layer, UCON policies are specified with predicates on subject and object attributes, along with system attributes as conditional constraints and user actions as obligations. General attributes include not only persistent attributes such as role and group memberships but also mutable usage attributes of subjects and objects. Conditions in UCON can be used to support context-based authorizations in ad hoc collaborations. In the enforcement model layer, our novel framework uses a hybrid approach for subject attribute acquisition with both push and pull modes. By leveraging attribute propagations between a centralized attribute repository and distributed policy decision points, our architecture supports decision continuity and attribute mutability of the UCON policy model, as well as obligation evaluations during policy enforcement. As a proof-of-concept, we implement a prototype system based on our proposed architecture and conduct experimental studies to demonstrate the feasibility and performance of our approach.

112 citations


Authors

Showing all 33297 results

NameH-indexPapersCitations
Pulickel M. Ajayan1761223136241
Xiaodong Wang1351573117552
S. Shankar Sastry12285886155
Sumio Iijima106633101834
Thomas W. Ebbesen9930570789
Kishor S. Trivedi9569836816
Sharad Malik9561537258
Shigeo Ohno9130328104
Adrian Perrig8937453367
Jan M. Rabaey8152536523
C. Lee Giles8053625636
Edward A. Lee7846234620
Otto Zhou7432218968
Katsumi Kaneko7458128619
Guido Groeseneken73107426977
Network Information
Related Institutions (5)
Bell Labs
59.8K papers, 3.1M citations

92% related

Hitachi
101.4K papers, 1.4M citations

92% related

Samsung
163.6K papers, 2M citations

91% related

IBM
253.9K papers, 7.4M citations

91% related

Intel
68.8K papers, 1.6M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20238
202220
2021234
2020518
2019952
20181,088