Sciweavers

2145 search results - page 193 / 429
» Pattern-Based Query Answering
Sort
View
96
Voted
IPSN
2004
Springer
15 years 8 months ago
A probabilistic approach to inference with limited information in sensor networks
We present a methodology for a sensor network to answer queries with limited and stochastic information using probabilistic techniques. This capability is useful in that it allows...
Rahul Biswas, Sebastian Thrun, Leonidas J. Guibas
117
Voted
HOTOS
2003
IEEE
15 years 8 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
DBISP2P
2003
Springer
70views Database» more  DBISP2P 2003»
15 years 7 months ago
A Robust Logical and Computational Characterisation of Peer-to-Peer Database Systems
In this paper we give a robust logical and computational characterisation of peer-to-peer (p2p) database systems. We first define a precise model-theoretic semantics of a p2p sys...
Enrico Franconi, Gabriel M. Kuper, Andrei Lopatenk...
120
Voted
AMTA
2004
Springer
15 years 6 months ago
Keyword Translation from English to Chinese for Multilingual QA
The Keyword Translator is a part of the Question Analyzer module in the JAVELIN Question-Answering system; it translates the keywords that are used to query documents and extract a...
Frank Lin, Teruko Mitamura
113
Voted
ECAI
2006
Springer
15 years 6 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer