Sciweavers

5414 search results - page 1008 / 1083
» Exploratory Model Building
Sort
View
IJSWIS
2006
108views more  IJSWIS 2006»
13 years 10 months ago
Information Retrieval by Semantic Similarity
Abstract. Semantic Similarity relates to computing the similarity between conceptually similar but not necessarily lexically similar terms. Typically, semantic similarity is comput...
Angelos Hliaoutakis, Giannis Varelas, Epimenidis V...
ISI
2006
Springer
13 years 10 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
JUCS
2008
149views more  JUCS 2008»
13 years 10 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
KAIS
2008
221views more  KAIS 2008»
13 years 10 months ago
Forecasting skewed biased stochastic ozone days: analyses, solutions and beyond
Much work on skewed, stochastic, high dimensional, and biased datasets usually implicitly solve each problem separately. Recently, we have been approached by Texas Commission on En...
Kun Zhang, Wei Fan
MICRO
2006
IEEE
159views Hardware» more  MICRO 2006»
13 years 10 months ago
MRF Reinforcer: A Probabilistic Element for Space Redundancy in Nanoscale Circuits
Shrinking devices to the nanoscale, increasing integration densities, and reducing of voltage levels down to the thermal limit, all conspire to produce faulty systems. Frequent oc...
Kundan Nepal, R. Iris Bahar, Joseph L. Mundy, Will...
« Prev « First page 1008 / 1083 Last » Next »