Sciweavers

270 search results - page 9 / 54
» Description of the RACER System and its Applications
Sort
View
TREC
2004
13 years 9 months ago
Question Answering with QACTIS at TREC 2004
We provide a description of the QACTIS question-answering system and its application to and performance in the 2004 TREC question-answering evaluation. Since this was also QACTIS&...
Patrick Schone, T. Bassi, A. Kulman, Gary M. Ciany...
NMR
2004
Springer
14 years 1 months ago
Generalizing the AGM postulates: preliminary results and applications
One of the crucial actions any reasoning system must undertake is the updating of its Knowledge Base (KB). This problem is usually referred to as the problem of belief change. The...
Giorgos Flouris, Dimitris Plexousakis, Grigoris An...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
14 years 2 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
CIDR
2011
224views Algorithms» more  CIDR 2011»
12 years 11 months ago
Transactional Intent
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 3 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson