Sciweavers

1810 search results - page 333 / 362
» An effective semantic search technique using ontology
Sort
View
93
Voted
DSN
2006
IEEE
15 years 1 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
VLDB
2002
ACM
166views Database» more  VLDB 2002»
14 years 9 months ago
COMA - A System for Flexible Combination of Schema Matching Approaches
Schema matching is the task of finding semantic correspondences between elements of two schemas. It is needed in many database applications, such as integration of web data source...
Hong Hai Do, Erhard Rahm
SRDS
2010
IEEE
14 years 7 months ago
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection so...
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, J...
NAACL
2003
14 years 11 months ago
An Analysis of Clarification Dialogue for Question Answering
We examine clarification dialogue, a mechanism for refining user questions with follow-up questions, in the context of open domain Question Answering systems. We develop an algori...
Marco De Boni, Suresh Manandhar
OOPSLA
2010
Springer
14 years 8 months ago
Random testing for higher-order, stateful programs
Testing is among the most effective tools available for finding bugs. Still, we know of no automatic technique for generating test cases that expose bugs involving a combination ...
Casey Klein, Matthew Flatt, Robert Bruce Findler