Sciweavers

17582 search results - page 3271 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
125
Voted
JAIR
2010
132views more  JAIR 2010»
15 years 2 months ago
Using Local Alignments for Relation Recognition
This paper discusses the problem of marrying structural similarity with semantic relatedness for Information Extraction from text. Aiming at accurate recognition of relations, we ...
Sophia Katrenko, Pieter W. Adriaans, Maarten van S...
165
Voted
PVLDB
2010
122views more  PVLDB 2010»
15 years 2 months ago
Database Replication: a Tale of Research across Communities
Replication is a key mechanism to achieve scalability and fault-tolerance in databases. Its importance has recently been further increased because of the role it plays in achievin...
Bettina Kemme, Gustavo Alonso
148
Voted
IDEAL
2010
Springer
15 years 1 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
93
Voted
JCNS
2011
61views more  JCNS 2011»
14 years 10 months ago
Automating the design of informative sequences of sensory stimuli
Adaptive stimulus design methods can potentially improve the efficiency of sensory neurophysiology experiments significantly; however, designing optimal stimulus sequences in re...
Jeremy Lewi, David M. Schneider, Sarah M. N. Wooll...
158
Voted
JDCTA
2010
139views more  JDCTA 2010»
14 years 10 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
« Prev « First page 3271 / 3517 Last » Next »