Sciweavers

314 search results - page 52 / 63
» Cubical token systems
Sort
View
SEMCO
2007
IEEE
14 years 2 months ago
Lexical and Discourse Analysis of Online Chat Dialog
One of the ultimate goals of natural language processing (NLP) systems is understanding the meaning of what is being transmitted, irrespective of the medium (e.g., written versus ...
Eric N. Forsythand, Craig H. Martell
ACMSE
2006
ACM
14 years 2 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
CIKM
2005
Springer
14 years 2 months ago
ViPER: augmenting automatic information extraction with visual perceptions
In this paper we address the problem of unsupervised Web data extraction. We show that unsupervised Web data extraction becomes feasible when supposing pages that are made up of r...
Kai Simon, Georg Lausen
IMC
2004
ACM
14 years 2 months ago
Bandwidth estimation in broadband access networks
There has been much work on developing techniques for estimating the capacity and the available bandwidth of network paths based on end-point measurements. The focus has primarily...
Karthik Lakshminarayanan, Venkata N. Padmanabhan, ...
ISSS
2002
IEEE
142views Hardware» more  ISSS 2002»
14 years 1 months ago
Round-Robin Arbiter Design and Generation
In this paper, we introduce a Round–robin Arbiter Generator (RAG) tool. The RAG tool can generate a design for a Bus Arbiter (BA). The BA is able to handle the exact number of b...
Vincent John Mooney III, George F. Riley, Eung S. ...