Sciweavers

1219 search results - page 233 / 244
» Where to Look Next
Sort
View
LISA
2000
13 years 11 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
NAACL
1994
13 years 11 months ago
A Report of Recent Progress in Transformation-Based Error-Driven Learning
Most recent research in trainable part of speech taggers has explored stochastic tagging. While these taggers obtain high accuracy, linguistic information is captured indirectly, ...
Eric Brill
COLING
1992
13 years 11 months ago
Generating Coherent Argumentative Paragraphs
Q Should I take AI this semester? We address the problem of generating a coherent A If you want to take courses likeparagraph presenting arguments for a conclusion in a Natural La...
Michael Elhadad
DFN
2009
13 years 11 months ago
MPLS-TP - The New Technology for Packet Transport Networks
: The Internet Engineering Task Force (IETF) and the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T) have undertaken a joint effort to...
Dieter Beller, Rolf Sperber
FSTTCS
2008
Springer
13 years 11 months ago
Banach-Mazur Games on Graphs
We survey determinacy, definability, and complexity issues of Banach-Mazur games on finite and infinite graphs. Infinite games where two players take turns to move a token thro...
Erich Grädel