Sciweavers

942 search results - page 150 / 189
» From System Comprehension to Program Comprehension
Sort
View
DASFAA
2010
IEEE
220views Database» more  DASFAA 2010»
13 years 8 months ago
An Effective Object-Level XML Keyword Search
Keyword search is widely recognized as a convenient way to retrieve information from XML data. In order to precisely meet users' search concerns, we study how to effectively r...
Zhifeng Bao, Jiaheng Lu, Tok Wang Ling, Liang Xu, ...
FLAIRS
2009
13 years 7 months ago
Computational Replication of Human Paraphrase Assessment
1 Two sentences are paraphrases if their meanings are equivalent but their words and syntax are different. Paraphrasing can be used to aid comprehension, stimulate prior knowledge,...
Philip M. McCarthy, Zhiqiang Cai, Danielle S. McNa...
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 7 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 4 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 1 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao