Sciweavers

6258 search results - page 999 / 1252
» Applied Text Generation
Sort
View
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 10 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
TPHOL
2003
IEEE
15 years 10 months ago
First Order Logic with Domain Conditions
This paper addresses the crucial issue in the design of a proof development system of how to deal with partial functions and the related question of how to treat undefined terms. ...
Freek Wiedijk, Jan Zwanenburg
HT
2003
ACM
15 years 10 months ago
Do adaptation rules improve web cost estimation?
Analogy-based estimation has, over the last 15 years, and particularly over the last 7 years, emerged as a promising approach with comparable accuracy to, or better than, algorith...
Emilia Mendes, Nile Mosley, Steve Counsell
SIGIR
2003
ACM
15 years 10 months ago
Fuzzy translation of cross-lingual spelling variants
We will present a novel two-step fuzzy translation technique for cross-lingual spelling variants. In the first stage, transformation rules are applied to source words to render th...
Ari Pirkola, Jarmo Toivonen, Heikki Keskustalo, Ka...
115
Voted
ACG
2003
Springer
15 years 10 months ago
Opponent-Model Search in Bao: Conditions for a Successful Application
Abstract Opponent-Model search is a game-tree search method that explicitly uses knowledge of the opponent. There is some risk involved in using Opponent-Model search. Both the pre...
H. H. L. M. Donkers, H. Jaap van den Herik, Jos W....