Sciweavers

178 search results - page 8 / 36
» When Can I Expect an Email Response
Sort
View
AAAI
1994
13 years 8 months ago
Termination Analysis of OPS5 Expert Systems
Bounded response time is an important requirement when rule-based expert systems are used in real-time applications. In the case the rule-based system cannot terminate in bounded ...
Hsiu-yen Tsai, Albert Mo Kim Cheng
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin
AINA
2007
IEEE
14 years 1 months ago
Effective Caching in Wireless Sensor Network
— This paper proposes few ways of improving a WSN’s energy efficiency that already uses an energy efficient data routing protocol for continuous monitoring application. The p...
Md. Ashiqur Rahman, Sajid Hussain
SIGIR
2005
ACM
14 years 1 months ago
Using term informativeness for named entity detection
Informal communication (e-mail, bulletin boards) poses a difficult learning environment because traditional grammatical and lexical information are noisy. Other information is nec...
Jason D. M. Rennie, Tommi Jaakkola
ASPDAC
2000
ACM
97views Hardware» more  ASPDAC 2000»
13 years 12 months ago
Symbolic debugging of globally optimized behavioral specifications
Symbolic debuggers are system development tools that can accelerate the validation speed of behavioral specifications by allowing a user to interact with an executing code at the ...
Inki Hong, Darko Kirovski, Miodrag Potkonjak, Mari...