Sciweavers

3555 search results - page 675 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
NAACL
2003
15 years 2 months ago
An Analysis of Clarification Dialogue for Question Answering
We examine clarification dialogue, a mechanism for refining user questions with follow-up questions, in the context of open domain Question Answering systems. We develop an algori...
Marco De Boni, Suresh Manandhar
ACL
1992
15 years 2 months ago
Estimating Upper and Lower Bounds on the Performance of Word-Sense Disambiguation Programs
We have recently reported on two new word-sense disambiguation systems, one trained on bilingual material (the Canadian Hansards) and the other trained on monolingual material (Ro...
William A. Gale, Kenneth Ward Church, David Yarows...
TIT
2008
134views more  TIT 2008»
15 years 1 months ago
Communication Over MIMO X Channels: Interference Alignment, Decomposition, and Performance Analysis
In a multiple-antenna system with two transmitters and two receivers, a scenario of data communication, known as the X channel, is studied in which each receiver receives data from...
Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, Ami...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 7 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
WWW
2008
ACM
16 years 2 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani