Sciweavers

5544 search results - page 1090 / 1109
» Three Inadequate Models
Sort
View
CORR
2004
Springer
120views Education» more  CORR 2004»
13 years 7 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
CN
2000
107views more  CN 2000»
13 years 7 months ago
Query routing for Web search engines: architecture and experiments
General-purpose search engines such as AltaVista and Lycos are notorious for returning irrelevant results in response to user queries. Consequently, thousands of specialized, topi...
Atsushi Sugiura, Oren Etzioni
COLING
2002
13 years 7 months ago
Data-driven Classification of Linguistic Styles in Spoken Dialogues
Language users have individual linguistic styles. A spoken dialogue system may benefit from adapting to the linguistic style of a user in input analysis and output generation. To ...
Thomas Portele
IJCV
2000
141views more  IJCV 2000»
13 years 7 months ago
Reliable Estimation of Dense Optical Flow Fields with Large Displacements
In this paper we show that a classic optical ow technique by Nagel and Enkelmann (1986) can be regarded as an early anisotropic di usion method with a di usion tensor. We introduc...
Luis Álvarez, Joachim Weickert, Javier S&aa...
JACM
2000
77views more  JACM 2000»
13 years 7 months ago
The fault span of crash failures
A crashing network protocol is an asynchronous protocol whose memory does not survive crashes. We show that a crashing network protocol that works over unreliable links can be driv...
George Varghese, Mahesh Jayaram
« Prev « First page 1090 / 1109 Last » Next »