Sciweavers

4511 search results - page 693 / 903
» Observation Based System Security
Sort
View
116
Voted
WICSA
2008
15 years 5 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...
114
Voted
ICWS
2003
IEEE
15 years 5 months ago
Accelerated Information Sharing for Law Enforcement (AISLE) Using Web Services
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Bob Slaski, Gerry Coleman
113
Voted
VLDB
1998
ACM
102views Database» more  VLDB 1998»
15 years 8 months ago
Using Schema Matching to Simplify Heterogeneous Data Translation
A broad spectrum of data is available on the Web in distinct heterogeneous sources, and stored under different formats. As the number of systems that utilize this heterogeneous da...
Tova Milo, Sagit Zohar
133
Voted
BMCBI
2005
134views more  BMCBI 2005»
15 years 3 months ago
Systematic feature evaluation for gene name recognition
In task 1A of the BioCreAtIvE evaluation, systems had to be devised that recognize words and phrases forming gene or protein names in natural language sentences. We approach this ...
Jörg Hakenberg, Steffen Bickel, Conrad Plake,...
133
Voted
TSP
2010
14 years 10 months ago
Distributed learning in multi-armed bandit with multiple players
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are distributed players competing for independent arms. Each arm, when played, offers i.i.d. reward a...
Keqin Liu, Qing Zhao