Sciweavers

228 search results - page 20 / 46
» Two Normal Forms for Rewriting P Systems
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Assisted peer-to-peer search with partial indexing
—In the past few years, peer-to-peer (P2P) networks have become a promising paradigm for building a wide variety of distributed systems and applications. The most popular P2P app...
Rongmei Zhang, Y. Charlie Hu
EMNLP
2010
13 years 5 months ago
A New Approach to Lexical Disambiguation of Arabic Text
We describe a model for the lexical analysis of Arabic text, using the lists of alternatives supplied by a broad-coverage morphological analyzer, SAMA, which include stable lemma ...
Rushin Shah, Paramveer S. Dhillon, Mark Liberman, ...
PRDC
2006
IEEE
14 years 1 months ago
Minimal System Conditions to Implement Unreliable Failure Detectors
In this paper we explore the minimal system requirements to implement unreliable failure detectors. We first consider systems formed by lossy asynchronous and eventually timely l...
Antonio Fernández, Ernesto Jiménez, ...
RAID
2007
Springer
14 years 1 months ago
Advanced Allergy Attacks: Does a Corpus Really Help?
Abstract. As research in automatic signature generators (ASGs) receives more attention, various attacks against these systems are being identified. One of these attacks is the “...
Simon P. Chung, Aloysius K. Mok
DATE
2005
IEEE
119views Hardware» more  DATE 2005»
14 years 1 months ago
Functional Validation of System Level Static Scheduling
Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a technique for comparing...
Samar Abdi, Daniel D. Gajski