Sciweavers

12807 search results - page 2498 / 2562
» Application - Platform Performance Modeling and Evaluation
Sort
View
JCDL
2004
ACM
106views Education» more  JCDL 2004»
15 years 9 months ago
Sharing encountered information: digital libraries get a social life
As part of a more extensive study of reading-related practices, we have explored how people share information they encounter in their everyday reading as a complement to the more ...
Catherine C. Marshall, Sara A. Bly
INLG
2004
Springer
15 years 9 months ago
Resolving Structural Ambiguity in Generated Speech
Ambiguity in the output is a concern for NLG in general. This paper considers the case of structural ambiguity in spoken language generation. We present an algorithm which inserts ...
Chris Mellish
APSEC
2003
IEEE
15 years 9 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
CSB
2003
IEEE
106views Bioinformatics» more  CSB 2003»
15 years 9 months ago
Reconstruction of Ancestral Gene Order after Segmental Duplication and Gene Loss
As gene order evolves through a variety of chromosomal rearrangements, conserved segments provide important insight into evolutionary relationships and functional roles of genes. ...
Jun Huan, Jan Prins, Wei Wang 0010, Todd J. Vision
CCS
2003
ACM
15 years 9 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
« Prev « First page 2498 / 2562 Last » Next »