Sciweavers

371 search results - page 73 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
NAACL
2004
13 years 11 months ago
Evaluating Multiple Aspects of Coherence in Student Essays
CriterionSM Online Essay Evaluation Service includes a capability that labels sentences in student writing with essay-based discourse elements (e.g., thesis statements). We descri...
Derrick Higgins, Jill Burstein, Daniel Marcu, Clau...
JUCS
2006
135views more  JUCS 2006»
13 years 9 months ago
Operational/Interpretive Unfolding of Multi-adjoint Logic Programs
Abstract: Multi-adjoint logic programming represents a very recent, extremely flexible attempt for introducing fuzzy logic into logic programming. In this setting, the execution of...
Pascual Julián, Ginés Moreno, Jaime ...
TJS
2002
105views more  TJS 2002»
13 years 9 months ago
Design and Prototype of a Performance Tool Interface for OpenMP
This paper proposes a performance tools interface for OpenMP, similar in spirit to the MPI profiling interface in its intent to define a clear and portable API that makes OpenMP ex...
Bernd Mohr, Allen D. Malony, Sameer Shende, Felix ...
INFOCOM
2008
IEEE
14 years 4 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
EUROPAR
2009
Springer
14 years 2 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris