Sciweavers

1898 search results - page 302 / 380
» About the art in this issue
Sort
View
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
13 years 4 months ago
Pathologies of temporal difference methods in approximate dynamic programming
Approximate policy iteration methods based on temporal differences are popular in practice, and have been tested extensively, dating to the early nineties, but the associated conve...
Dimitri P. Bertsekas
COLING
2010
13 years 4 months ago
Automatic Temporal Expression Normalization with Reference Time Dynamic-Choosing
Temporal expressions in texts contain significant temporal information. Understanding temporal information is very useful in many NLP applications, such as information extraction,...
Xujian Zhao, Peiquan Jin, Lihua Yue
JAMIA
2010
76views more  JAMIA 2010»
13 years 4 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
JBCS
2010
85views more  JBCS 2010»
13 years 4 months ago
OWL schema matching
Schema matching is a fundamental issue to many database applications, such as query mediation and data warehousing. It becomes a challenge when different vocabularies are used to r...
Luiz André P. Paes Leme, Marco A. Casanova,...
RE
2010
Springer
13 years 3 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis