Sciweavers

2205 search results - page 327 / 441
» Mutation Operators for Specifications
Sort
View
122
Voted
LREC
2010
188views Education» more  LREC 2010»
15 years 4 months ago
Pattern-Based Extraction of Negative Polarity Items from Dependency-Parsed Text
We describe a new method for extracting Negative Polarity Item candidates (NPI candidates) from dependency-parsed German text corpora. Semi-automatic extraction of NPIs is a chall...
Fabienne Fritzinger, Frank Richter, Marion Weller
97
Voted
MASCOTS
2010
15 years 4 months ago
An Analytical Model with Improved Accuracy of IEEE 802.11 Protocol Under Unsaturated Conditions
In this work the authors present an analytical model that -- compared to previously published work -- more accurately captures the delay of IEEE 802.11 protocol under low, medium,...
Kumaran Vijayasankar, Azar Taufique, Lakshmi Naras...
102
Voted
EON
2008
15 years 4 months ago
Semantic Web Service Discovery and Selection: a Test Bed Scenario
Abstract. The Semantic Web Service Challenge is one of the major initiative dedicated to work on Semantic Web Service (SWS) discovery and selection. It represents an effective mann...
Alessio Carenini, Dario Cerizza, Marco Comerio, Em...
129
Voted
ICAI
2008
15 years 4 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
124
Voted
IIWAS
2008
15 years 4 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang