Sciweavers

886 search results - page 166 / 178
» From Detecting Errors to Automatically Correcting Them
Sort
View
EMNLP
2009
13 years 6 months ago
Toward Completeness in Concept Extraction and Classification
Many algorithms extract terms from text together with some kind of taxonomic classification (is-a) link. However, the general approaches used today, and specifically the methods o...
Eduard H. Hovy, Zornitsa Kozareva, Ellen Riloff
SAC
2010
ACM
13 years 8 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 8 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
INFOCOM
2006
IEEE
14 years 2 months ago
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs
— Today’s IEEE 802.11 WLANs (Wireless LANs) provide multiple transmission rates so that different rates can be exploited in an adaptive manner depending on the underlying chann...
Jongseok Kim, Seongkwan Kim, Sunghyun Choi, Daji Q...
IJRR
2008
139views more  IJRR 2008»
13 years 8 months ago
Learning to Control in Operational Space
One of the most general frameworks for phrasing control problems for complex, redundant robots is operational space control. However, while this framework is of essential importan...
Jan Peters, Stefan Schaal