Sciweavers

175 search results - page 18 / 35
» Case Provenance: The Value of Remembering Case Sources
Sort
View
CORR
2008
Springer
88views Education» more  CORR 2008»
13 years 9 months ago
Coding Strategies for Noise-free Relay Cascades with Half-Duplex Constraint
Abstract--Two types of noise-free relay cascades are investigated. Networks where a source communicates with a distant receiver via a cascade of half-duplex constrained relays, and...
Tobias Lutz, Christoph Hausl, Ralf Koetter
EUROPAR
2001
Springer
14 years 1 months ago
Optimal Many-to-One Routing on the Mesh with Constant Queues
We present randomized and deterministic algorithms for many-to-one routing on an n-node two-dimensional mesh under the store-and-forward model of packet routing. We consider the g...
Andrea Pietracaprina, Geppino Pucci
ELPUB
1999
ACM
14 years 1 months ago
The UK Children's Publishing House - Adapting to Change for the Multimedia Market
The research project currently in progress aims to develop a comprehensive understanding of the children’s multimedia publishing industry in the UK and the challenges of adapting...
Audrey Anthoney, Jo Royle, Ian M. Johnson
COMPSAC
2009
IEEE
14 years 27 days ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
LREC
2008
60views Education» more  LREC 2008»
13 years 10 months ago
A Framework for Identity Resolution and Merging for Multi-source Information Extraction
In the context of ontology-based information extraction, identity resolution is the process of deciding whether an instance extracted from text refers to a known entity in the tar...
Milena Yankova, Horacio Saggion, Hamish Cunningham