Sciweavers

1265 search results - page 82 / 253
» Finding the Key to a Synapse
Sort
View
ACL
2006
13 years 10 months ago
Towards Conversational QA: Automatic Identification of Problematic Situations and User Intent
To enable conversational QA, it is important to examine key issues addressed in conversational systems in the context of question answering. In conversational systems, understandi...
Joyce Y. Chai, Chen Zhang, Tyler Baldwin
CIIT
2004
131views Communications» more  CIIT 2004»
13 years 10 months ago
Effectiveness of rate-limiting in mitigating flooding DOS attacks
This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to di...
Jarmo Mölsä
GEOINFO
2004
13 years 10 months ago
Automatic Geometric and Radiometric Registration of Landsat-TM Images Using Mutual Information
: This work is on development of a method for automatic registration of satellite images acquired on different dates, for both geometric and radiometric correction with respect to ...
José P. Queiroz-Neto, Mario Fernando Monten...
IASTEDSE
2004
13 years 10 months ago
Does active guidance improve software inspections? A preliminary empirical study
Inspections are an established quality assurance technique. In order to optimize the inspection approach, different reading techniques, such as checklist-based reading and scenari...
Christian Denger, Marcus Ciolkowski, Filippo Lanub...
IASTEDSE
2004
13 years 10 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...