Sciweavers

1016 search results - page 99 / 204
» Explore or Exploit
Sort
View
DATE
2010
IEEE
175views Hardware» more  DATE 2010»
14 years 1 months ago
Approximate logic synthesis for error tolerant applications
─ Error tolerance formally captures the notion that – for a wide variety of applications including audio, video, graphics, and wireless communications – a defective chip that...
Doochul Shin, Sandeep K. Gupta
SEMWEB
2007
Springer
14 years 3 months ago
Solving Semantic Ambiguity to Improve Semantic Web based Ontology Matching
A new paradigm in Semantic Web research focuses on the development of a new generation of knowledge-based problem solvers, which can exploit the massive amounts of formally speciï¬...
Jorge Gracia, Vanessa Lopez, Mathieu d'Aquin, Mart...
PAM
2005
Springer
14 years 2 months ago
Internet Routing Policies and Round-Trip-Times
Abstract. Round trip times (RTTs) play an important role in Internet measurements. In this paper, we explore some of the ways in which routing policies impact RTTs. In particular, ...
Han Zheng, Eng Keong Lua, Marcelo Pias, Timothy G....
DIMVA
2008
13 years 10 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
BMCBI
2004
144views more  BMCBI 2004»
13 years 9 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...