Sciweavers

653 search results - page 101 / 131
» Enhancing Commitment Machines
Sort
View
SIGCSE
2006
ACM
188views Education» more  SIGCSE 2006»
15 years 5 months ago
A data mining course for computer science: primary sources and implementations
An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of a...
David R. Musicant
ACSAC
2005
IEEE
15 years 5 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
DATE
2005
IEEE
87views Hardware» more  DATE 2005»
15 years 5 months ago
Concurrent Error Detection in Asynchronous Burst-Mode Controllers
We discuss the problem of Concurrent Error Detection (CED) in a popular class of asynchronous controllers, namely Burst-Mode machines. We first outline the particularities of the...
Sobeeh Almukhaizim, Yiorgos Makris
ISCAS
2005
IEEE
140views Hardware» more  ISCAS 2005»
15 years 5 months ago
Macroblock-based algorithm for dual-bitstream MPEG video streaming with VCR functionalities
— Reverse playback is the most common video cassette recording (VCR) functions in many digital video players. However, the predictive processing techniques employed in MPEG sever...
Tak-Piu Ip, Yui-Lam Chan, Chang-Hong Fu, Wan-Chi S...
104
Voted
DIS
2005
Springer
15 years 5 months ago
Exploring Predicate-Argument Relations for Named Entity Recognition in the Molecular Biology Domain
In this paper, the semantic relationships between a predicate and its arguments in terms of semantic roles are employed to improve lexical-based named entity recognition (NER) in t...
Tuangthong Wattarujeekrit, Nigel Collier