Sciweavers

5550 search results - page 1050 / 1110
» Different Approaches to Proof Systems
Sort
View
AVI
2008
15 years 15 days ago
The need for an interaction cost model in adaptive interfaces
The development of intelligent assistants has largely benefited from the adoption of decision-theoretic (DT) approaches that enable an agent to reason and account for the uncertai...
Bowen Hui, Sean Gustafson, Pourang Irani, Craig Bo...
CIDR
2007
116views Algorithms» more  CIDR 2007»
14 years 11 months ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland
SIGSAND
2008
14 years 11 months ago
Reference Model for Service-oriented Business Software Based on Web Service Nets
Configurable business software solutions are increasingly being implemented based on service oriented architectures (SOA). Hereunto model driven approaches for the definition and i...
Maik Herfurth, Thomas Karle, Frank Schönthale...
107
Voted
DBSEC
2006
131views Database» more  DBSEC 2006»
14 years 11 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
87
Voted
TREC
2004
14 years 11 months ago
Can We Get A Better Retrieval Function From Machine?
The quality of an information retrieval system heavily depends on its retrieval function, which returns a similarity measurement between the query and each document in the collect...
Weiguo Fan, Wensi Xi, Edward A. Fox, Li Wang
« Prev « First page 1050 / 1110 Last » Next »