Sciweavers

6770 search results - page 243 / 1354
» How GPUs Work
Sort
View
IM
2007
15 years 5 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
134
Voted
NAACL
2007
15 years 5 months ago
Unsupervised Natural Language Processing Using Graph Models
In the past, NLP has always been based on the explicit or implicit use of linguistic knowledge. In classical computer linguistic applications explicit rule based approaches prevai...
Chris Biemann
126
Voted
TAMODIA
2008
15 years 5 months ago
A Fluid Flow Approach to Usability Analysis of Multi-user Systems
Abstract. The analysis of usability aspects of multi-user systems, such as cooperative work systems and pervasive systems, pose particular problems because group behavior of their ...
Mieke Massink, Diego Latella, Maurice H. ter Beek,...
115
Voted
CRIWG
2003
15 years 4 months ago
Transparent Latecomer Support for Synchronous Groupware
In a collaborative session users may join and leave. A user who joins a session is called a latecomer. A latecomer needs the current state of the collaborative session to participa...
Stephan Lukosch
104
Voted
DGO
2003
79views Education» more  DGO 2003»
15 years 4 months ago
Finding Outliers in Models of Spatial Data
Statistical models fit to data often require extensive and challenging re-estimation before achieving final form. For example, outliers can adversely affect fits. In other cas...
David W. Scott, J. Blair Christian