Sciweavers

1486 search results - page 268 / 298
» Firewall Rules Analysis
Sort
View
JCIT
2010
146views more  JCIT 2010»
14 years 6 months ago
Determing Performance of Choreography-based Composite Services
Web Service Choreography Description Language is a main-stream standard for the description of peer-to-peer collaborations for the participants for service composition. To predict...
Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang
CIKM
2011
Springer
13 years 11 months ago
Fact-based question decomposition for candidate answer re-ranking
Factoid questions often contain one or more assertions (facts) about their answers. However, existing question-answering (QA) systems have not investigated how the multiple facts ...
Aditya Kalyanpur, Siddharth Patwardhan, Branimir B...
CORR
2012
Springer
195views Education» more  CORR 2012»
13 years 7 months ago
Ranking hubs and authorities using matrix functions
The notions of subgraph centrality and communicability, based on the exponential of the adjacency matrix of the underlying graph, have been effectively used in the analysis of und...
Michele Benzi, Ernesto Estrada, Christine Klymko
POPL
2003
ACM
16 years 3 days ago
Discovering affine equalities using random interpretation
We present a new polynomial-time randomized algorithm for discovering affine equalities involving variables in a program. The key idea of the algorithm is to execute a code fragme...
Sumit Gulwani, George C. Necula
RECOMB
2002
Springer
16 years 3 days ago
Monotony of surprise and large-scale quest for unusual words
The problem of characterizing and detecting recurrent sequence patterns such as substrings or motifs and related associations or rules is variously pursued in order to compress da...
Alberto Apostolico, Mary Ellen Bock, Stefano Lonar...