Sciweavers

1981 search results - page 272 / 397
» Model-Checking Hierarchical Structures
Sort
View
SOFTVIS
2005
ACM
14 years 2 months ago
Visual data mining in software archives
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
Michael Burch, Stephan Diehl, Peter Weißgerb...
CIS
2005
Springer
14 years 2 months ago
Survivability Computation of Networked Information Systems
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
14 years 2 months ago
Sufficiency verification of HIV-1 pathogenesis based on multi-agent simulation
Researchers of HIV-1 are today, still unable to determine exactly the biological mechanisms that cause AIDS. Various mechanisms have been hypothesized and their existences have be...
Zaiyi Guo, Hann Kwang Han, Joc Cing Tay
ICIC
2005
Springer
14 years 2 months ago
Automatic Construction of Bayesian Networks for Conversational Agent
Abstract. As the information in the internet proliferates, the methods for effectively providing the information have been exploited, especially in conversational agents. Bayesian ...
Sungsoo Lim, Sung-Bae Cho
IJCNLP
2005
Springer
14 years 2 months ago
Improving Korean Speech Acts Analysis by Using Shrinkage and Discourse Stack
Abstract. A speech act is a linguistic action intended by a speaker. It is important to analyze the speech act for the dialogue understanding system because the speech act of an ut...
Kyungsun Kim, Youngjoong Ko, Jungyun Seo