Sciweavers

3358 search results - page 617 / 672
» The Knowledge Grid Environment
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
ACL
2012
11 years 11 months ago
Applications of GPC Rules and Character Structures in Games for Learning Chinese Characters
We demonstrate applications of psycholinguistic and sublexical information for learning Chinese characters. The knowledge about the grapheme-phoneme conversion (GPC) rules of lang...
Wei-Jie Huang, Chia-Ru Chou, Yu-Lin Tzeng, Chia-Yi...
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
14 years 9 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...
RECOMB
2005
Springer
14 years 9 months ago
Comparative Systems Biology of the Sporulation Initiation Network in Prokaryotes
Many years of experimental and computational molecular biology of model organisms such as Escherichia coli and Saccharomyces cerevisiae has elucidated the gene regulatory network i...
Michiel J. L. de Hoon, Dennis Vitkup
ASPLOS
2010
ACM
14 years 3 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...