Sciweavers

1757 search results - page 330 / 352
» Secure Content Validation
Sort
View
IMC
2005
ACM
14 years 29 days ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...
CLEF
2005
Springer
14 years 29 days ago
UNED at iCLEF 2005: Automatic Highlighting of Potential Answers
In this paper, we describe UNED’s participation in the iCLEF 2005 track. We have compared two strategies for finding an answer using an interactive question answering system: i...
Víctor Peinado, Fernando López-Osten...
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 27 days ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
CASES
2004
ACM
14 years 25 days ago
High-level power analysis for on-chip networks
As on-chip networks become prevalent in multiprocessor systemson-a-chip and multi-core processors, they will be an integral part of the design flow of such systems. With power in...
Noel Eisley, Li-Shiuan Peh
FTDCS
2003
IEEE
14 years 21 days ago
Autonomous Transaction Processing Using Data Dependency in Mobile Environments
Mobile clients retrieve and update databases at servers. They use transactions in order to ensure the consistency of shared data in the presence of concurrent accesses. Transactio...
IlYoung Chung, Bharat K. Bhargava, Malika Mahoui, ...