Sciweavers

1486 search results - page 262 / 298
» Firewall Rules Analysis
Sort
View
CORR
2007
Springer
107views Education» more  CORR 2007»
14 years 11 months ago
Morphological annotation of Korean with Directly Maintainable Resources
This article describes an exclusively resource-based method of morphological annotation of written Korean text. Korean is an agglutinative language. Our annotator is designed to p...
Ivan Berlocher, Hyun-Gue Huh, Eric Laporte, Jee-Su...
JCM
2006
60views more  JCM 2006»
14 years 11 months ago
A Harmful Interference Model for Unlicensed Device Operation in Licensed service Bands
Recent FCC proceedings have considered the notion of unlicensed device operation in licensed bands. Licensed users are concerned about harmful interference while unlicensed device ...
Timothy X. Brown
DKE
2007
99views more  DKE 2007»
14 years 11 months ago
Interaction pattern detection in process oriented information systems
Finding interaction patterns is a challenging problem, but this kind of information about processes or social networks might be useful for an organization’s management to unders...
Schahram Dustdar, Thomas Hoffmann
JMLR
2006
131views more  JMLR 2006»
14 years 11 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
MANSCI
2008
89views more  MANSCI 2008»
14 years 11 months ago
Research Note - When Is Versioning Optimal for Information Goods?
This paper provides insights about when versioning is an optimal strategy for information goods. Our characterization of this class of goods is that variable costs are invariant w...
Hemant K. Bhargava, Vidyanand Choudhary