Sciweavers

2084 search results - page 340 / 417
» Knowledge Exploitation from the Web
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
ICCV
2003
IEEE
14 years 2 months ago
Reinforcement Learning for Combining Relevance Feedback Techniques
Relevance feedback (RF) is an interactive process which refines the retrievals by utilizing user’s feedback history. Most researchers strive to develop new RF techniques and ign...
Peng-Yeng Yin, Bir Bhanu, Kuang-Cheng Chang, Anlei...
GCC
2003
Springer
14 years 2 months ago
The Design and Implementation of the GridLab Information Service
The grid computing paradigm emerged recently as a new field distinguished from traditional distributed computing because of its focus on large-scale resource sharing and innovativ...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, D...
SIGMOD
2010
ACM
209views Database» more  SIGMOD 2010»
14 years 2 months ago
ProgXe: progressive result generation framework for multi-criteria decision support queries
We demonstrate ProgXe, a practical approach to support MultiCriteria Decision Support (MCDS) applications that need to report results as they are being generated to enable the use...
Venkatesh Raghavan, Elke A. Rundensteiner
PROFES
2001
Springer
14 years 1 months ago
A Family-Oriented Software Development Process for Engine Controllers
This paper presents a family-based software development process for aero-engine control software. The process uses a “family capability” derived from family analysis of the emb...
Karen Allenby, Simon Burton, Darren L. Buttle, Joh...