UNT College of Engineering - 171 Matching Results

Search Results

FALCON: Boosting Knowledge for Answer Engines

Description: This paper discusses FALCON, an answer engine that integrates different forms of syntactic, semantic and pragmatic knowledge for the goal of achieving better performance.
Date: November 2000
Creator: Harabagiu, Sanda M.; Moldovan, Dan I.; Paşca, Marius. 1974-; Mihalcea, Rada, 1974-; Surdeanu, Mihai; Bunescu, Răzvan et al.

Finding Semantic Associations on Express Lane

Description: This paper introduces a new codification scheme for efficient computation of measures in semantic networks. The scheme is particularly useful for fast computation of semantic associations between words and implementation of an informational retrieval operator for efficient search in semantic spaces. Other applications may also be possible.
Date: May 2004
Creator: Nastase, Vivi & Mihalcea, Rada, 1974-

Graph-based Ranking Algorithms for Sentence Extraction, Applied to Text Summarization

Description: Abstract: This paper presents an innovative unsupervised method for automatic sentence extraction using graph-based ranking algorithms. We evaluate the method in the context of a text summarization task, and show that the results obtained compare favorably with previously published results on established benchmarks.
Date: July 2004
Creator: Mihalcea, Rada, 1974-

Grid-based Coordinated Routing in Wireless Sensor Networks

Description: This paper discusses grid-based coordinated routing in wireless sensor networks and compares the energy available in the network over time for different grid sizes. The authors explore the quality of service of wireless sensor networks, how the coordinator nodes are elected, and the size of the grid area that will minimize the total energy consumption and extend the lifetime of the network.
Date: January 2007
Creator: Akl, Robert G. & Sawant, Uttara

How to Hide Secrets from Operating System: Architecture Level Support for Dynamic Address Trace Obfuscation

Description: This technical report addresses how to hide secrets from an operating system. The authors provide a detailed design for the VM blackbox and some microarchitecture level simulation derived performance data. They also describe a compiler directed prefetch scheme that uses both instruction and data prefetches to obfuscate the address traces on the address bus between on-chip L2 cache and memory.
Date: 2004
Creator: Gomathisankaran, Mahadevan & Tyagi, Akhilesh