Sciweavers

2458 search results - page 336 / 492
» Database-Management Principles And Applications
Sort
View
JAIR
2010
158views more  JAIR 2010»
14 years 8 months ago
A Survey of Paraphrasing and Textual Entailment Methods
Paraphrasing methods recognize, generate, or extract phrases, sentences, or longer natural language expressions that convey almost the same information. Textual entailment methods...
Ion Androutsopoulos, Prodromos Malakasiotis
RAS
2010
137views more  RAS 2010»
14 years 8 months ago
Development of complex robotic systems using the behavior-based control architecture iB2C
This paper presents a development methodology for complex robotic systems using the behavior-based control architecture iB2C (integrated Behavior-Based Control). It is shown how a...
Martin Proetzsch, Tobias Luksch, Karsten Berns
SIGMETRICS
2010
ACM
144views Hardware» more  SIGMETRICS 2010»
14 years 8 months ago
The sustainability hub: an information management tool for analysis and decision making
Sustainability is becoming an increasingly important driver for which decision makers – consumers, corporate and government – rely on principled, accurate and provenanced metr...
Steve Cayzer, Chris Preist
TON
2010
68views more  TON 2010»
14 years 8 months ago
Upgrading mice to elephants: effects and end-point solutions
Abstract— Short TCP flows may suffer significant responsetime performance degradations during network congestion. Unfortunately, this creates an incentive for misbehavior by cl...
Amit Mondal, Aleksandar Kuzmanovic
VIROLOGY
2010
113views more  VIROLOGY 2010»
14 years 8 months ago
A general definition of malware
We propose a general, formal definition of the concept of malware (malicious software) as a single sentence in the language of a certain modal logic. Our definition al thanks to it...
Simon Kramer, Julian C. Bradfield