Sciweavers

2474 search results - page 479 / 495
» Using Knowledge Management Systems to Structure Knowledgeabl...
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
13 years 11 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ATAL
2010
Springer
13 years 9 months ago
Opportunistic belief reconciliation during distributed interactions
Successful interaction between autonomous agents is contingent on those agents making decisions consistent with the expectations of their peers -- these expectations are based on ...
Paul Martin, David Robertson, Michael Rovatsos
BMCBI
2006
171views more  BMCBI 2006»
13 years 8 months ago
The Autoimmune Disease Database: a dynamically compiled literature-derived database
Background: Autoimmune diseases are disorders caused by an immune response directed against the body's own organs, tissues and cells. In practice more than 80 clinically dist...
Thomas Karopka, Juliane Fluck, Heinz-Theodor Mevis...
TWC
2008
201views more  TWC 2008»
13 years 7 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
ACL
2010
13 years 5 months ago
All Words Domain Adapted WSD: Finding a Middle Ground between Supervision and Unsupervision
In spite of decades of research on word sense disambiguation (WSD), all-words general purpose WSD has remained a distant goal. Many supervised WSD systems have been built, but the...
Mitesh M. Khapra, Anup Kulkarni, Saurabh Sohoney, ...