Sciweavers

175 search results - page 18 / 35
» Case Provenance: The Value of Remembering Case Sources
Sort
View
100
Voted
CORR
2008
Springer
88views Education» more  CORR 2008»
15 years 14 days ago
Coding Strategies for Noise-free Relay Cascades with Half-Duplex Constraint
Abstract--Two types of noise-free relay cascades are investigated. Networks where a source communicates with a distant receiver via a cascade of half-duplex constrained relays, and...
Tobias Lutz, Christoph Hausl, Ralf Koetter
EUROPAR
2001
Springer
15 years 4 months ago
Optimal Many-to-One Routing on the Mesh with Constant Queues
We present randomized and deterministic algorithms for many-to-one routing on an n-node two-dimensional mesh under the store-and-forward model of packet routing. We consider the g...
Andrea Pietracaprina, Geppino Pucci
77
Voted
ELPUB
1999
ACM
15 years 4 months ago
The UK Children's Publishing House - Adapting to Change for the Multimedia Market
The research project currently in progress aims to develop a comprehensive understanding of the children’s multimedia publishing industry in the UK and the challenges of adapting...
Audrey Anthoney, Jo Royle, Ian M. Johnson
92
Voted
COMPSAC
2009
IEEE
15 years 4 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
LREC
2008
60views Education» more  LREC 2008»
15 years 1 months ago
A Framework for Identity Resolution and Merging for Multi-source Information Extraction
In the context of ontology-based information extraction, identity resolution is the process of deciding whether an instance extracted from text refers to a known entity in the tar...
Milena Yankova, Horacio Saggion, Hamish Cunningham