Sciweavers

601 search results - page 92 / 121
» A Noisy-Channel Approach to Question Answering
Sort
View
TOOLS
2008
IEEE
14 years 2 months ago
Modeling of Component Environment in Presence of Callbacks and Autonomous Activities
Abstract. A popular approach to compositional verification of component-based applications is based on the assume-guarantee paradigm, where an assumption models behavior of an env...
Pavel Parizek, Frantisek Plasil
IPPS
2007
IEEE
14 years 2 months ago
Replication Strategy in Unstructured Peer-to-Peer Systems
1 The unstructured Peer-to-Peer (P2P) systems usually use a “blind search” method to find the requested data object by propagating a query to a number of peers randomly. In or...
Guofu Feng, Yuquan Jiang, Guihai Chen, Qing Gu, Sa...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 2 months ago
Static and Dynamic Weaving in System Software with AspectC++
— System software strongly relies on the availability of static as well as dynamic adaptation techniques. With AspectOriented Programming (AOP) it is now possible to adapt even p...
Wolfgang Schröder-Preikschat, Daniel Lohmann,...
ACSAC
2005
IEEE
14 years 2 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
SSDBM
2005
IEEE
218views Database» more  SSDBM 2005»
14 years 2 months ago
The "Best K" for Entropy-based Categorical Data Clustering
With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has sati...
Keke Chen, Ling Liu