Sciweavers

3190 search results - page 612 / 638
» Natural Language in Information Retrieval
Sort
View
TCS
2008
13 years 7 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
ICSOC
2010
Springer
13 years 6 months ago
Creating Context-Adaptive Business Processes
Abstract. As the dynamicity of today's business environments keeps increasing, there is a need to continuously adapt business processes in order to respond to the changes in t...
Gabriel Hermosillo, Lionel Seinturier, Laurence Du...
COLING
2010
13 years 2 months ago
A Comparison of Models for Cost-Sensitive Active Learning
Active Learning (AL) is a selective sampling strategy which has been shown to be particularly cost-efficient by drastically reducing the amount of training data to be manually ann...
Katrin Tomanek, Udo Hahn
TALG
2010
93views more  TALG 2010»
13 years 2 months ago
Distributed error confinement
We initiate the study of error confinement in distributed applications, where the goal is that only nodes that were directly hit by a fault may deviate from their correct external...
Yossi Azar, Shay Kutten, Boaz Patt-Shamir
WWW
2005
ACM
14 years 8 months ago
Opinion observer: analyzing and comparing opinions on the Web
The Web has become an excellent source for gathering consumer opinions. There are now numerous Web sites containing such opinions, e.g., customer reviews of products, forums, disc...
Bing Liu, Minqing Hu, Junsheng Cheng