Sciweavers

5326 search results - page 1051 / 1066
» On what we can ensure
Sort
View
137
Voted
COLING
1992
15 years 1 months ago
Learning Translation Templates From Bilingual Text
This paper proposes a two-phase example-based machine translation methodology which develops translation templates from examples and then translates using template matching. This ...
Hiroyuki Kaji, Yuuko Kida, Yasutsugu Morimoto
SIGCOMM
2010
ACM
15 years 20 days ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 17 days ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
AIM
2006
15 years 16 days ago
Comparative Analysis of Frameworks for Knowledge-Intensive Intelligent Agents
maintain awareness of its environment for a long period of time. Additionally, knowledge-intensive agents must be engineered such that their knowledge can be easily updated as envi...
Randolph M. Jones, Robert E. Wray III
BMCBI
2006
145views more  BMCBI 2006»
15 years 16 days ago
GEM System: automatic prototyping of cell-wide metabolic pathway models from genomes
Background: Successful realization of a "systems biology" approach to analyzing cells is a grand challenge for our understanding of life. However, current modeling appro...
Kazuharu Arakawa, Yohei Yamada, Kosaku Shinoda, Yo...
« Prev « First page 1051 / 1066 Last » Next »