Sciweavers

5550 search results - page 1040 / 1110
» Different Approaches to Proof Systems
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Chameleon: Adaptive Peer-to-Peer Streaming with Network Coding
—Layered streaming can be used to adapt to the available download capacity of an end-user, and such adaptation is very much required in real world HTTP media streaming. The multi...
Anh Tuan Nguyen, Baochun Li, Frank Eliassen
RR
2010
Springer
14 years 8 months ago
Processing RIF and OWL2RL within DLVHEX
We present an extension of the DLVHEX system to support RIF-Core, a dialect of W3C’s Rule Interchange Format (RIF), as well as combinations of RIF-Core and OWL2RL ontologies. DLV...
Marco Marano, Philipp Obermeier, Axel Polleres
ACSAC
2010
IEEE
14 years 8 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
104
Voted
AND
2010
14 years 8 months ago
Reshaping automatic speech transcripts for robust high-level spoken document analysis
High-level spoken document analysis is required in many applications seeking access to the semantic content of audio data, such as information retrieval, machine translation or au...
Julien Fayolle, Fabienne Moreau, Christian Raymond...
96
Voted
CICLING
2009
Springer
14 years 8 months ago
NLP for Shallow Question Answering of Legal Documents Using Graphs
Abstract. Previous work has shown that modeling relationships between articles of a regulation as vertices of a graph network works twice as better than traditional information ret...
Alfredo Monroy, Hiram Calvo, Alexander F. Gelbukh
« Prev « First page 1040 / 1110 Last » Next »