Sciweavers

3281 search results - page 604 / 657
» An Approach to use Executable Models for Testing
Sort
View
CSFW
2011
IEEE
12 years 8 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
JAIR
2006
157views more  JAIR 2006»
13 years 8 months ago
Decision-Theoretic Planning with non-Markovian Rewards
A decision process in which rewards depend on history rather than merely on the current state is called a decision process with non-Markovian rewards (NMRDP). In decisiontheoretic...
Sylvie Thiébaux, Charles Gretton, John K. S...
BMCBI
2010
160views more  BMCBI 2010»
13 years 9 months ago
Annotation of gene promoters by integrative data-mining of ChIP-seq Pol-II enrichment data
Background: Use of alternative gene promoters that drive widespread cell-type, tissue-type or developmental gene regulation in mammalian genomes is a common phenomenon. Chromatin ...
Ravi Gupta, Priyankara Wikramasinghe, Anirban Bhat...
CIKM
2006
Springer
14 years 17 days ago
Coupling feature selection and machine learning methods for navigational query identification
It is important yet hard to identify navigational queries in Web search due to a lack of sufficient information in Web queries, which are typically very short. In this paper we st...
Yumao Lu, Fuchun Peng, Xin Li, Nawaaz Ahmed
LREC
2010
213views Education» more  LREC 2010»
13 years 10 months ago
Extensive Evaluation of a FrameNet-WordNet mapping resource
Lexical resources are basic components of many text processing system devoted to information extraction, question answering or dialogue. In paste years many resources have been de...
Diego De Cao, Danilo Croce, Roberto Basili