Sciweavers

411 search results - page 36 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
IPPS
2005
IEEE
15 years 3 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
EACL
2006
ACL Anthology
14 years 11 months ago
Edit Machines for Robust Multimodal Language Processing
Multimodal grammars provide an expressive formalism for multimodal integration and understanding. However, handcrafted multimodal grammars can be brittle with respect to unexpecte...
Srinivas Bangalore, Michael Johnston
APCCM
2010
14 years 11 months ago
Metric of intrinsic information content for measuring semantic similarity in an ontology
Measuring information content (IC) from the intrinsic information of an ontology is an important however a formidable task. IC is useful for further measurement of the semantic si...
Md. Seddiqui Hanif, Masaki Aono
PODS
2011
ACM
201views Database» more  PODS 2011»
14 years 24 days ago
Data exchange beyond complete data
In the traditional data exchange setting, source instances are restricted to be complete in the sense that every fact is either true or false in these instances. Although natural ...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...