Sciweavers

1058 search results - page 140 / 212
» Inferring Knowledge from a Large Semantic Network
Sort
View
EMNLP
2011
14 years 3 months ago
Relation Extraction with Relation Topics
This paper describes a novel approach to the semantic relation detection problem. Instead of relying only on the training instances for a new relation, we leverage the knowledge l...
Chang Wang, James Fan, Aditya Kalyanpur, David Gon...
AAAI
1993
15 years 5 months ago
On the Adequateness of the Connection Method
Roughly speaking, adequatness is the property of a theorem proving method to solve simpler problems faster than more difficult ones. Automated inferencing methods are often not ad...
Antje Beringer, Steffen Hölldobler
EURONGI
2004
Springer
15 years 7 months ago
Performance of Different Proxy Concepts in UMTS Networks
It is well known that the large round trip time and the highly variable delay in a cellular network may degrade the performance of TCP. Many concepts have been proposed to improve ...
Marc Necker, Michael Scharf, Andreas Weber 0003
136
Voted
JSAC
2010
130views more  JSAC 2010»
15 years 2 months ago
Distributed target tracking using signal strength measurements by a wireless sensor network
Abstract—Wireless Sensor Networks are well suited for tracking targets carrying RFID tags in indoor environments. Tracking based on the received signal strength indication (RSSI)...
Anand Oka, Lutz H.-J. Lampe
ISICA
2009
Springer
15 years 10 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong