Sciweavers

1580 search results - page 21 / 316
» Non-Interference Through Determinism
Sort
View
IJMI
2002
75views more  IJMI 2002»
14 years 10 months ago
Assessing the consistency of a biomedical terminology through lexical knowledge
: Objective: In this paper, we investigate the use of lexical knowledge for determining consistency in biomedical terminologies. We focus on adjectival modification as a way of ass...
Olivier Bodenreider, Anita Burgun, Thomas C. Rindf...
ML
2000
ACM
14 years 10 months ago
Maximizing Theory Accuracy Through Selective Reinterpretation
Existing methods for exploiting awed domain theories depend on the use of a su ciently large set of training examples for diagnosing and repairing aws in the theory. In this paper,...
Shlomo Argamon-Engelson, Moshe Koppel, Hillel Walt...
86
Voted
ICDAR
2007
IEEE
15 years 2 months ago
Identification of Latin-Based Languages through Character Stroke Categorization
This paper presents a language identification technique that detects Latin-based languages of imaged documents without OCR. The proposed technique detects languages through the wo...
S. J. Lu, L. Li, Chew Lim Tan
DSOM
2006
Springer
15 years 2 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
93
Voted
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 6 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay