Sciweavers

663 search results - page 99 / 133
» PKI design for the real world
Sort
View
CSCW
2008
ACM
13 years 9 months ago
Can markets help?: applying market mechanisms to improve synchronous communication
There is a growing interest in applying market mechanisms to tackle everyday communication problems such as communication interruptions and communication overload. Prior analytic ...
Gary Hsieh, Robert Kraut, Scott E. Hudson, Roberto...
EDCC
2008
Springer
13 years 9 months ago
Software Faults Diagnosis in Complex OTS Based Safety Critical Systems
This work addresses the problem of software fault diagnosis in complex safety critical software systems. The transient manifestations of software faults represent a challenging is...
Gabriella Carrozza, Domenico Cotroneo, Stefano Rus...
FPL
2008
Springer
178views Hardware» more  FPL 2008»
13 years 9 months ago
High-speed regular expression matching engine using multi-character NFA
An approach is presented for high throughput matching of regular expressions (regexes) by first converting them into corresponding Non-deterministic Finite Automata (NFAs) which a...
Norio Yamagaki, Reetinder P. S. Sidhu, Satoshi Kam...
EMNLP
2008
13 years 9 months ago
Who is Who and What is What: Experiments in Cross-Document Co-Reference
This paper describes a language-independent, scalable system for both challenges of crossdocument co-reference: name variation and entity disambiguation. We provide system results...
Alex Baron, Marjorie Freedman
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 9 months ago
Radius Plots for Mining Tera-byte Scale Graphs: Algorithms, Patterns, and Observations
Given large, multi-million node graphs (e.g., FaceBook, web-crawls, etc.), how do they evolve over time? How are they connected? What are the central nodes and the outliers of the...
U. Kang, Charalampos E. Tsourakakis, Ana Paula App...