Sciweavers

2373 search results - page 345 / 475
» Towards a Model of Computer Systems Research
Sort
View
ACL
2011
14 years 8 months ago
Peeling Back the Layers: Detecting Event Role Fillers in Secondary Contexts
The goal of our research is to improve event extraction by learning to identify secondary role filler contexts in the absence of event keywords. We propose a multilayered event e...
Ruihong Huang, Ellen Riloff
ACMSE
2004
ACM
15 years 10 months ago
Mapping component specifications to Enterprise JavaBeans implementations
Component-based software development has become an important approach to building complex software systems. Much research focuses on component specification to achieve the advanta...
Yi Liu, H. Conrad Cunningham
ISORC
2000
IEEE
15 years 9 months ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
PDIS
1993
IEEE
15 years 8 months ago
Nested Loops Revisited
The research communityhas considered hash-based parallel joinalgorithmsthe algorithmsof choice for almosta decade. However, almostnone ofthe commercialparallel database systems us...
David J. DeWitt, Jeffrey F. Naughton, Joseph Burge...
ASIACRYPT
2011
Springer
14 years 4 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin