Sciweavers

371 search results - page 74 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
SAFECOMP
2005
Springer
13 years 11 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
KDD
2008
ACM
172views Data Mining» more  KDD 2008»
14 years 6 months ago
Structured metric learning for high dimensional problems
The success of popular algorithms such as k-means clustering or nearest neighbor searches depend on the assumption that the underlying distance functions reflect domain-specific n...
Jason V. Davis, Inderjit S. Dhillon
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
14 years 6 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
SIGLEX
1991
13 years 9 months ago
Presuppositions and Default Reasoning: A Study in Lexical Pragmatics
Explaining how the meaning of words relate to the meaning of the utterance in which they are used is of utmost importance. The most common approaches view the meaning of an uttera...
Robert E. Mercer
BXML
2003
13 years 7 months ago
An Instructional Component for Dynamic Course Generation and Delivery
: E-Learning offers the advantage of interactivity: an E-Learning system can adapt the learning materials to suit the learner’s personality and his goals, and it can react to the...
Carsten Ullrich