Sciweavers

1638 search results - page 304 / 328
» A General Semantics for Evaluation Logic
Sort
View
CBSE
2011
Springer
13 years 11 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale
WSDM
2012
ACM
304views Data Mining» more  WSDM 2012»
13 years 6 months ago
Beyond co-occurrence: discovering and visualizing tag relationships from geo-spatial and temporal similarities
Studying relationships between keyword tags on social sharing websites has become a popular topic of research, both to improve tag suggestion systems and to discover connections b...
Haipeng Zhang, Mohammed Korayem, Erkang You, David...
WWW
2009
ACM
15 years 12 months ago
Understanding user's query intent with wikipedia
Understanding the intent behind a user's query can help search engine to automatically route the query to some corresponding vertical search engines to obtain particularly re...
Jian Hu, Gang Wang, Frederick H. Lochovsky, Jian-T...
CIKM
2009
Springer
15 years 5 months ago
Completing wikipedia's hyperlink structure through dimensionality reduction
Wikipedia is the largest monolithic repository of human knowledge. In addition to its sheer size, it represents a new encyclopedic paradigm by interconnecting articles through hyp...
Robert West, Doina Precup, Joelle Pineau
CCS
2003
ACM
15 years 4 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson