Sciweavers

1413 search results - page 245 / 283
» ideas 2007
Sort
View
ACL
1992
15 years 1 months ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
UAI
2007
15 years 1 months ago
"I Can Name that Bayesian Network in Two Matrixes!"
The traditional approach to building Bayesian networks is to build the graphical structure using a graphical editor and then add probabilities using a separate spreadsheet for eac...
Russell Almond
BPSC
2009
184views Business» more  BPSC 2009»
15 years 29 days ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
BPSC
2009
240views Business» more  BPSC 2009»
15 years 29 days ago
Modelling and Solving Configuration Problems on Business Processes Using a Multi-Level Constraint Satisfaction Approach
Abstract: In this paper we present our ideas to apply constraint satisfaction on business processes. We propose a multi-level constraint satisfaction approach to handle t levels of...
Wolfgang Runte
ADHOC
2007
118views more  ADHOC 2007»
14 years 12 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...