Sciweavers

2006 search results - page 328 / 402
» Heuristic Security-Testing Methods
Sort
View
ICMCS
1999
IEEE
131views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Integrating Web Resources and Lexicons into a Natural Language Query System
The START system responds to natural language queries with answers in text, pictures, and other media. START's sentence-level natural language parsing relies on a number of m...
Boris Katz, Deniz Yuret, Jimmy J. Lin, Sue Felshin...
CP
1999
Springer
14 years 1 months ago
Rewriting Numeric Constraint Satisfaction Problems for Consistency Algorithms
Reformulating constraint satisfaction problems (CSPs) in lower arity is a common procedure when computing consistency. Lower arity CSPs are simpler to treat than high arity CSPs. ...
Claudio Lottaz
HICSS
1998
IEEE
117views Biometrics» more  HICSS 1998»
14 years 1 months ago
OBIWAN - A Visual Interface for Prompted Query Refinement
Typically, users submit very simple search queries to digital document data collections. Often these queries can result in extremely broad answers or answers in which document rel...
James W. Cooper, Roy J. Byrd
ICCAD
1997
IEEE
144views Hardware» more  ICCAD 1997»
14 years 1 months ago
Partial scan delay fault testing of asynchronous circuits
Asynchronous circuits operate correctly only under timing assumptions. Hence testing those circuits for delay faults is crucial. This paper describes a three-step method to detect...
Michael Kishinevsky, Alex Kondratyev, Luciano Lava...
ICRA
1994
IEEE
90views Robotics» more  ICRA 1994»
14 years 1 months ago
Pursuing Projections: Keeping a Robot on Path
For an autonomous robot navigating in an unstructured outdoor environment, staying close to a path is crucial to successfully reaching its goal. Although the degree of accuracy wi...
Karen T. Sutherland, William B. Thompson