Sciweavers

473 search results - page 89 / 95
» Dynamic logics of knowledge and access
Sort
View
CIKM
2009
Springer
14 years 5 days ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
SEMWEB
2001
Springer
13 years 12 months ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
ENVSOFT
2007
122views more  ENVSOFT 2007»
13 years 7 months ago
Fuzzy expert systems and GIS for cholera health risk prediction in southern Africa
Cholera (Vibrio cholerae) is endemic in southern Africa and frequently breaks out in epidemics along the eastern seaboard. Extensive resources are directed at combating cholera ye...
Gavin Fleming, Marna van der Merwe, Graeme McFerre...
DAC
2002
ACM
14 years 8 months ago
Scheduler-based DRAM energy management
Previous work on DRAM power-mode management focused on hardware-based techniques and compiler-directed schemes to explicitly transition unused memory modules to low-power operatin...
Victor Delaluz, Anand Sivasubramaniam, Mahmut T. K...
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz