Sciweavers

745 search results - page 68 / 149
» The origins of combinatorics on words
Sort
View
BPM
2008
Springer
158views Business» more  BPM 2008»
15 years 3 months ago
Towards Transformations from BPMN to Heterogeneous Systems
Abstract. By now, the mapping from BPMN to BPEL has been implemented in numerous tools, greatly assisting the business architect in the creation of BPEL processes. However, most of...
Tobias Küster, Axel Heßler
CIIT
2007
133views Communications» more  CIIT 2007»
15 years 3 months ago
Linear-tree rule structure for firewall optimization
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
Liang Zhao, A. Shimae, Hiroshi Nagamochi
EMNLP
2004
15 years 3 months ago
Object-Extraction and Question-Parsing using CCG
Accurate dependency recovery has recently been reported for a number of wide-coverage statistical parsers using Combinatory Categorial Grammar (CCG). However, overall figures give...
Stephen Clark, Mark Steedman, James R. Curran
IFIP13
2004
15 years 3 months ago
Designing Distributed Task Performance in Safety-Critical Systems Equipped With Mobile Devices
: This paper describes a method aiming to support the design of interactive-safety critical systems. The method proposes an original integration of approaches usually considered se...
Ana-Maria Marhan, Fabio Paternò, Carmen San...
IC
2003
15 years 3 months ago
Denying Denial-of-Service Attacks: A Router Based Solution
Distributed Denial-of-Service (DDoS) attacks prevent users from accessing services on the target network by flooding the target network with a large volume of traffic. In this pap...
Zhang Shu, Partha Dasgupta