Sciweavers

12783 search results - page 2462 / 2557
» Experimenting with computing
Sort
View
ISI
2005
Springer
14 years 4 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
MMMACNS
2005
Springer
14 years 4 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
OOPSLA
2005
Springer
14 years 4 months ago
Safe futures for Java
is a simple and elegant abstraction that allows concurrency to be expressed often through a relatively small rewrite of a sequential program. In the absence of side-effects, futur...
Adam Welc, Suresh Jagannathan, Antony L. Hosking
VLDB
2005
ACM
103views Database» more  VLDB 2005»
14 years 4 months ago
Mapping Maintenance for Data Integration Systems
To answer user queries, a data integration system employs a set of semantic mappings between the mediated schema and the schemas of data sources. In dynamic environments sources o...
Robert McCann, Bedoor K. AlShebli, Quoc Le, Hoa Ng...
ATAL
2005
Springer
14 years 4 months ago
Optimal status sets of heterogeneous agent programs
There are many situations where an agent can perform one of several sets of actions in responses to changes in its environment, and the agent chooses to perform the set of actions...
Bogdan Stroe, V. S. Subrahmanian, Sudeshna Dasgupt...
« Prev « First page 2462 / 2557 Last » Next »