Sciweavers

2702 search results - page 397 / 541
» Requirements Processes: An Experience Report
Sort
View
ICARIS
2005
Springer
14 years 3 months ago
Polymorphism and Danger Susceptibility of System Call DASTONs
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
Anjum Iqbal, Mohd Aizaini Maarof
CICLING
2004
Springer
14 years 3 months ago
Extracting Semantic Categories of Nouns for Syntactic Disambiguation from Human-Oriented Explanatory Dictionaries
: Syntactic disambiguation frequently requires knowledge of the semantic categories of nouns, especially in languages with free word order. For example, in Spanish the phrases pint...
Hiram Calvo, Alexander F. Gelbukh
ACSAC
2003
IEEE
14 years 3 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
SC
2003
ACM
14 years 3 months ago
MRNet: A Software-Based Multicast/Reduction Network for Scalable Tools
We present MRNet, a software-based multicast/reduction network for building scalable performance and system administration tools. MRNet supports multiple simultaneous, asynchronou...
Philip C. Roth, Dorian C. Arnold, Barton P. Miller
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
14 years 3 months ago
Studying the Advantages of a Messy Evolutionary Algorithm for Natural Language Tagging
The process of labeling each word in a sentence with one of its lexical categories (noun, verb, etc) is called tagging and is a key step in parsing and many other language processi...
Lourdes Araujo