Sciweavers

4763 search results - page 150 / 953
» On the Execution of Deep Models
Sort
View
IJCAI
2003
15 years 1 months ago
Getting Serious about the Development of Computational Humor
Society needs humor, not just for entertainment. In the Web age, presentations become more and more flexible and personalized and they will require hu­ mor contributions for elec...
Oliviero Stock, Carlo Strapparava
COMCOM
2004
92views more  COMCOM 2004»
14 years 11 months ago
Benefits of traffic engineering using QoS routing schemes and network controls
We demonstrate the benefits of traffic engineering by studying three realistic network models derived from an actual service provider network. We evaluate traffic engineering in t...
Shekhar Srivastava, Balaji Krithikaivasan, Cory C....
CORR
2002
Springer
104views Education» more  CORR 2002»
14 years 11 months ago
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
In order to control the process of data mining and focus on the things of interest to us, many kinds of constraints have been added into the algorithms of data mining. However, di...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
JODL
2000
114views more  JODL 2000»
14 years 11 months ago
Integrating ontologies and thesauri for RDF schema creation and metadata querying
In this paper we present a new approach for building metadata schemas by integrating existing ontologies and structured vocabularies (thesauri). This integration is based on the s...
Bernd Amann, Irini Fundulaki, Michel Scholl
BIRTHDAY
2010
Springer
14 years 10 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...