Sciweavers

1154 search results - page 219 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
AI
2006
Springer
13 years 7 months ago
Generating and evaluating evaluative arguments
Evaluative arguments are pervasive in natural human communication. In countless situations people attempt to advise or persuade their interlocutors that something is desirable (vs...
Giuseppe Carenini, Johanna D. Moore
COMPUTER
2000
180views more  COMPUTER 2000»
13 years 7 months ago
The Challenges of Automatic Summarization
tion--the art of abstracting key content from one or more information sources--has become an integral part of everyday life. People keep abreast of world affairs by listening to ne...
Udo Hahn, Inderjeet Mani
BMCBI
2008
184views more  BMCBI 2008»
13 years 7 months ago
"TOF2H": A precision toolbox for rapid, high density/high coverage hydrogen-deuterium exchange mass spectrometry via an LC-MALDI
Background: Protein-amide proton hydrogen-deuterium exchange (HDX) is used to investigate protein conformation, conformational changes and surface binding sites for other molecule...
Pornpat Nikamanon, Elroy Pun, Wayne Chou, Marek D....
FAST
2009
13 years 5 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 11 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou