Sciweavers

14386 search results - page 205 / 2878
» The Chinese Generals Problem
Sort
View
WWW
2008
ACM
16 years 4 months ago
Asymmetrical query recommendation method based on bipartite network resource allocation
This paper presents a new query recommendation method that generates recommended query list by mining large-scale user logs. Starting from the user logs of click-through data, we ...
Zhiyuan Liu, Maosong Sun
CIKM
2005
Springer
15 years 9 months ago
A novel refinement approach for text categorization
In this paper we present a novel strategy, DragPushing, for improving the performance of text classifiers. The strategy is generic and takes advantage of training errors to succes...
Songbo Tan, Xueqi Cheng, Moustafa Ghanem, Bin Wang...
IJCNLP
2005
Springer
15 years 9 months ago
Machine Translation Based on Constraint-Based Synchronous Grammar
This paper proposes a variation of synchronous grammar based on the formalism of context-free grammar by generalizing the first component of productions that models the source text...
Fai Wong, Dong-Cheng Hu, Yu-Hang Mao, Ming-Chui Do...
SACMAT
2010
ACM
15 years 8 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
NOSSDAV
2009
Springer
15 years 8 months ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....