Sciweavers

1486 search results - page 174 / 298
» Firewall Rules Analysis
Sort
View
SIGIR
2003
ACM
15 years 9 months ago
Probabilistic term variant generator for biomedical terms
This paper presents an algorithm to generate possible variants for biomedical terms. The algorithm gives each variant its generation probability representing its plausibility, whi...
Yoshimasa Tsuruoka, Jun-ichi Tsujii
ITNG
2010
IEEE
15 years 9 months ago
Applying Semantic Web Techniques to Reservoir Engineering: Challenges and Experiences from Event Modeling
—In reservoir engineering domain experts deal with many tasks and operations, ranging from reservoir simulation to well maintenance scheduling, with the goal of maximizing oil pr...
Tao Zhu, Amol Bakshi, Viktor K. Prasanna, Karthik ...
TRUST
2010
Springer
15 years 9 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...
ITCC
2000
IEEE
15 years 8 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
IPPS
1998
IEEE
15 years 8 months ago
A Molecular Quasi-Random Model of Computations Applied to Evaluate Collective Intelligence
The paper presents how the Random PROLOG Processor (RPP), a bio-inspired model of computations, can be used for formalization and analysis of a phenomenon - the Collective Intelli...
Tadeusz Szuba