Sciweavers

2392 search results - page 324 / 479
» informs 2000
Sort
View
207
Voted
POPL
2007
ACM
16 years 2 months ago
Preferential path profiling: compactly numbering interesting paths
Path profiles provide a more accurate characterization of a program's dynamic behavior than basic block or edge profiles, but are relatively more expensive to collect. This h...
Kapil Vaswani, Aditya V. Nori, Trishul M. Chilimbi
108
Voted
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 8 months ago
Electronic Government at the Grass Roots: Contemporary Evidence and Future Trends
In this article we explore the short and largely undocumented history of electronic government, discuss the literature of e-government at the local government level, and document ...
Stephen H. Holden, Donald F. Norris, Patricia D. F...
127
Voted
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
127
Voted
PDSE
2000
96views more  PDSE 2000»
15 years 4 months ago
Applying Distributed Object Technology to Network Planning
The aim of this paper is to describe a generic interface through which a planning tool or design aid can be connected to a telecommunications network. In today's complex and ...
Tertius D. Wessels, Judy M. Bishop
129
Voted
ANLP
1994
108views more  ANLP 1994»
15 years 3 months ago
Does Baum-Welch Re-estimation Help Taggers?
In part of speech tagging by Hidden Markov Model, a statistical model is used to assign grammatical categories to words in a text. Early work in the field relied on a corpus which...
David Elworthy