Sciweavers

1316 search results - page 172 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
CLEF
2008
Springer
13 years 10 months ago
Assessing the Impact of Thesaurus-Based Expansion Techniques in QA-Centric IR
In this paper, we assess the impact of using thesaurus-based query expansion methods, at the Information Retrieval (IR) stage of a Question Answering (QA) system. We focus on expan...
Luís Sarmento, Jorge Teixeira, Eugén...
CLEF
2010
Springer
13 years 10 months ago
Building Strategies, a Year Later
Abstract. After participating in last year's CLEF IP (2009) evaluation benchmark, our scores were rather low. The CLEF IP 2010 PAC task enabled us to correct some experiments ...
Wouter Alink, Roberto Cornacchia, Arjen P. de Vrie...
ATAL
2007
Springer
14 years 3 months ago
Multiagent reinforcement learning and self-organization in a network of agents
To cope with large scale, agents are usually organized in a network such that an agent interacts only with its immediate neighbors in the network. Reinforcement learning technique...
Sherief Abdallah, Victor R. Lesser
ICNP
2003
IEEE
14 years 2 months ago
The Temporal and Topological Characteristics of BGP Path Changes
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates ...
Di-Fa Chang, Ramesh Govindan, John S. Heidemann
CCS
2006
ACM
14 years 20 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...