Sciweavers

19130 search results - page 3512 / 3826
» Modelling multi-path problems
Sort
View
176
Voted
ACL
2012
13 years 6 months ago
Named Entity Disambiguation in Streaming Data
The named entity disambiguation task is to resolve the many-to-many correspondence between ambiguous names and the unique realworld entity. This task can be modeled as a classifi...
Alexandre Davis, Adriano Veloso, Altigran Soares d...
165
Voted
TKDE
2012
207views Formal Methods» more  TKDE 2012»
13 years 6 months ago
Mining Web Graphs for Recommendations
—As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommend...
Hao Ma, Irwin King, Michael R. Lyu
CADE
2012
Springer
13 years 6 months ago
A Simplex-Based Extension of Fourier-Motzkin for Solving Linear Integer Arithmetic
Abstract. This paper describes a novel decision procedure for quantifierfree linear integer arithmetic. Standard techniques usually relax the initial problem to the rational domai...
François Bobot, Sylvain Conchon, Evelyne Co...
152
Voted
EDBT
2012
ACM
228views Database» more  EDBT 2012»
13 years 6 months ago
Finding maximal k-edge-connected subgraphs from a large graph
In this paper, we study how to find maximal k-edge-connected subgraphs from a large graph. k-edge-connected subgraphs can be used to capture closely related vertices, and findin...
Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang...
119
Voted
AAAI
2012
13 years 6 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
« Prev « First page 3512 / 3826 Last » Next »