Sciweavers

1059 search results - page 122 / 212
» The PISAB Question Answering System
Sort
View
ICSE
1995
IEEE-ACM
15 years 5 months ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
ASIACRYPT
2009
Springer
15 years 8 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
SEMWEB
2009
Springer
15 years 8 months ago
Actively Learning Ontology Matching via User Interaction
Ontology matching plays a key role for semantic interoperability. Many methods have been proposed for automatically finding the alignment between heterogeneous ontologies. However...
Feng Shi, Juanzi Li, Jie Tang, Guo Tong Xie, Hanyu...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 8 months ago
A Theoretical Perspective on Effective Interorganizational Knowledge
Interorganizational knowledge sharing is critical to knowledge intensive collaborations between organizations. Despite a proliferation of literature on knowledge sharing, most stu...
Nongkran Lertpittayapoom, Souren Paul, Peter P. My...
RTAS
2006
IEEE
15 years 7 months ago
On Non-Utilization Bounds for Arbitrary Fixed Priority Policies
Prior research on schedulability bounds focused primarily on bounding utilization as a means to meet deadline constraints. Non-trivial bounds were found for a handful of schedulin...
Xue Liu, Tarek F. Abdelzaher