Sciweavers

6202 search results - page 1150 / 1241
» Without Loss of Generality
Sort
View
WORM
2004
14 years 11 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
79
Voted
ACL
1998
14 years 11 months ago
Locating Noun Phrases with Finite State Transducers
We present a method for constructing, maintaining and consulting a database of proper nouns. We describe noun phrases composed of a proper noun and/or a description of a human occ...
Jean Senellart
70
Voted
TREC
2003
14 years 11 months ago
Searching for geneRIFs: Concept-Based Query Expansion and Bayes Classification
k gene annotations. Our indexing machinery produces per indexed MEDLINE abstract a list of concepts with an accompanying weight, termed a fingerprint. Searching is done by matching...
Rob Jelier, Martijn J. Schuemie, C. Christiaan van...
87
Voted
WSC
1998
14 years 11 months ago
Using Simulation to Optimize a Horizontal Carousel Storage System
Carousel storage systems are often used to increase storage density, throughput and efficiency while reducing inventory and man-hours. The Hewlett-Packard company has developed a ...
Todd LeBaron, Michael L. Hoffman
CASCON
1996
124views Education» more  CASCON 1996»
14 years 11 months ago
Supporting procedural constructs in existing SQL compilers
The draft ofthe SQL/PSM standard de nes a procedural extension to the existing SQL2 language. An essential part of this extension is the support of procedural constructs such as B...
Gene Fuh, Jyh-Herng Chow, Nelson Mendonça M...
« Prev « First page 1150 / 1241 Last » Next »