Sciweavers

9210 search results - page 1589 / 1842
» Analyzing Real-Time Systems
Sort
View
EACL
2006
ACL Anthology
15 years 2 months ago
A Two-Stage Approach to Retrieving Answers for How-To Questions
This paper addresses the problem of automatically retrieving answers for how-to questions, focusing on those that inquire about the procedure for achieving a specific goal. For su...
Ling Yin
101
Voted
FORTE
2004
15 years 2 months ago
Localizing Program Errors for Cimple Debugging
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
Samik Basu, Diptikalyan Saha, Scott A. Smolka
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 2 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
ICMLA
2004
15 years 2 months ago
LASSO: a learning architecture for semantic web ontologies
Expressing web page content in a way that computers can understand is the key to a semantic web. Generating ontological information from the web automatically using machine learni...
Christopher N. Hammack, Stephen D. Scott
CRIWG
2001
15 years 2 months ago
Enabling the Collaborative Construction and Reuse of Knowledge through a Virtual Reference Environment
This paper analyzes some of the factors that prevent knowledge construction and reuse in traditional library settings and describes VRef, an environment designed to provide users ...
J. Alfredo Sánchez, Alberto García, ...
« Prev « First page 1589 / 1842 Last » Next »