Sciweavers

2715 search results - page 442 / 543
» An Implementation of Narrowing Strategies
Sort
View
WORM
2004
13 years 11 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
WSC
2004
13 years 11 months ago
Stream Option Manager
Stream Option Manager (SOM) is a set of mathematical tools developed at The MITRE Corporation's Center for Advanced Aviation System Development (CAASD). While still under dev...
William P. Niedringhaus, Michael J. White, Patrick...
NAACL
2003
13 years 11 months ago
Factored Language Models and Generalized Parallel Backoff
We introduce factored language models (FLMs) and generalized parallel backoff (GPB). An FLM represents words as bundles of features (e.g., morphological classes, stems, data-drive...
Jeff Bilmes, Katrin Kirchhoff
PARCO
2003
13 years 11 months ago
Cache Memory Behavior of Advanced PDE Solvers
Three different partial differential equation (PDE) solver kernels are analyzed in respect to cache memory performance on a simulated shared memory computer. The kernels implement...
Dan Wallin, Henrik Johansson, Sverker Holmgren
AAAI
2000
13 years 11 months ago
Making Rational Decisions Using Adaptive Utility Elicitation
Rational decision making requires full knowledge of the utility function of the person affected by the decisions. However, in many cases, the task of acquiring such knowledge is n...
Urszula Chajewska, Daphne Koller, Ronald Parr