Sciweavers

2478 search results - page 363 / 496
» Universality in two dimensions
Sort
View
75
Voted
NCA
2007
IEEE
15 years 7 months ago
A Topological Analysis of Monitor Placement
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
119
Voted
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 7 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
82
Voted
GECCO
2007
Springer
155views Optimization» more  GECCO 2007»
15 years 7 months ago
COSMO: a correlation sensitive mutation operator for multi-objective optimization
This contribution is the first to discover exploitable structural features within circuit optimization problems (COP) and discuss how it is indicative of a general structure and ...
Varun Aggarwal, Una-May O'Reilly
ICADL
2007
Springer
112views Education» more  ICADL 2007»
15 years 7 months ago
Automated Template-Based Metadata Extraction Architecture
This paper describes our efforts to develop a toolset and process for automated metadata extraction from large, diverse, and evolving document collections. A number of federal agen...
Paul Flynn, Li Zhou, Kurt Maly, Steven J. Zeil, Mo...
99
Voted
ICWE
2007
Springer
15 years 7 months ago
Fixing Weakly Annotated Web Data Using Relational Models
In this paper, we present a fast and scalable Bayesian model for improving weakly annotated data – which is typically generated by a (semi) automated information extraction (IE) ...
Fatih Gelgi, Srinivas Vadrevu, Hasan Davulcu