Sciweavers

3555 search results - page 604 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
LREC
2008
145views Education» more  LREC 2008»
15 years 2 months ago
BOEMIE Ontology-Based Text Annotation Tool
The huge amount of the available information in the Web creates the need of effective information extraction systems that are able to produce metadata that satisfy user's inf...
Pavlina Fragkou, Georgios Petasis, Aris Theodorako...
RIAO
2000
15 years 2 months ago
Automatic Question Answering
We have developed a method for answering single answer questions automatically using a collection of documents or the Internet as a source of data for the production of the answer...
James R. Cowie, Yevgeny Ludovik, Hugo Molina-Salga...
ISMB
1993
15 years 2 months ago
Knowledge-Based Generation of Machine-Learning Experiments: Learning with DNA Crystallography Data
Thoughit has been possible in the past to learn to predict DNAhydration patterns from crystallographic data, there is ambiguity in the choice of training data (both in terms of th...
Dawn M. Cohen, Casimir A. Kulikowski, Helen Berman
SIGMETRICS
2008
ACM
124views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Class-of-service in ip backbones: informing the network neutrality debate
The benefit of Class-of-Service (CoS) is an important topic in the "Network Neutrality" debate. Proponents of network neutrality suggest that over-provisioning is a viab...
Murat Yuksel, Kadangode K. Ramakrishnan, Shivkumar...
CONTEXT
1999
Springer
15 years 5 months ago
Contexts, Domains, and Software
We survey some issues that relate to context dependence and context sensitivity in the development of software, particularly in relation to information systems by defining a range...
Alfs T. Berztiss