Sciweavers

2504 search results - page 426 / 501
» Using Probabilistic Information in Data Integration
Sort
View
123
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
FCCM
2004
IEEE
130views VLSI» more  FCCM 2004»
15 years 6 months ago
Hyperreconfigurable Architectures for Fast Run Time Reconfiguration
Dynamically reconfigurable architectures or systems are able to reconfigure their function and/or structure to suit changing needs of a computation during run time. The increasing...
Sebastian Lange, Martin Middendorf
PVLDB
2010
159views more  PVLDB 2010»
15 years 24 days ago
Explore or Exploit? Effective Strategies for Disambiguating Large Databases
Data ambiguity is inherent in applications such as data integration, location-based services, and sensor monitoring. In many situations, it is possible to “clean”, or remove, ...
Reynold Cheng, Eric Lo, Xuan Yang, Ming-Hay Luk, X...
139
Voted
VTC
2010
IEEE
185views Communications» more  VTC 2010»
15 years 7 days ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
115
Voted
LREC
2010
165views Education» more  LREC 2010»
15 years 3 months ago
Improving Personal Name Search in the TIGR System
This paper describes the development and evaluation of enhancements to the specialized information retrieval capabilities of a multimodal reporting system. The system enables coll...
Keith J. Miller, Sarah McLeod, Elizabeth Schroeder...