Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Dropped Pronoun Recovery in Chinese SMS

Publication
November 02, 2015
… Dropped Pronoun Recovery in Chinese SMS Chris Giannella Ransom Winder Ph.D. Stacy Petersen In written Chinese, personal … After applying a word segmenter, we used a linear-chain conditional random field (CRF) to predict which words were at the start of an independent clause. Then, using the independent … example, consider Figure 1, below, and the task of relation detection. The message expresses a contact relation between John and the author of the message. A common approach to relation …

Experience using Collaborative Technology with the United Nations and Multi-National Militaries: Rim of the Pacific 2000 Strong Angel Exercise in Humanitarian Assistance

Publication
October 01, 2000
… United Nations and Multi-National Militaries: Rim of the Pacific 2000 Strong Angel Exercise in Humanitarian Assistance Mark Adkins John Kruse Laurie Damianos JoAnn Brooks Robert Younger … with the U.S . Navy's Commander Third Fleet (Third Fleet) and The MITRE Corporation (MITRE) to use and evaluate collaborative technology during Strong Angel, a humanitarian …

Novelty Discovery with Heterogeneous Features

Publication
July 01, 2010
… domain of our work is database security, with the goal of detecting attacks that are similar to those seen in the past as well as completely novel attacks that have not yet been seen. The training data … Proceedings of AAAI/IAAI. Vol. 1. 709-716. Fonseca, J. Vieira, M. Madeira, H. (2008) “Online Detection of Malicious Data Access using DBMS Auditing.” SAC. Fortaleza, Ceara, Brazil. …

XML in the Wild Blue Yonder: A Survey of USAF XML Implementations & Implications

Publication
October 01, 2005
… XML in the Wild Blue Yonder: A Survey of USAF XML Implementations & Implications Cheryl Connors Amit … Air Force (USAF) communities are incorporating XML as a foundational step in their migration to a net-centric vision. A recent survey of XML implementations found that many United States Air …

Results on the Evaluation of NetReality, Inc. WiseWan 202 System for Traffic Shaping Performance

Publication
May 01, 2001
… that the WiseWan can effectively identify and provide favorable transmission performance to traffic marked as mission-critical while adhering to user-specified rules and priorities. … capabilities that deliver distinctively high throughput for mission-critical traffic in the presence of congestion on the links and with other traffic sharing the link bandwidth. In … report. ✦ Access control per user views, user authentication. ✦ Extensive report filters. ✦ Online Help facility. A.3.4 Analysis Reports ✦ Line status and utilization. © 2001 The MITRE …

Simple, Accurate Electrostatics-based Formulas for Calculating Ionization Potentials, Electron Affinities, and Capacitances of Fullerenes

Publication
April 21, 2017
… fullerene. A set of simple analytic formulas is derived via electrostatics-based methods to accurately calculate the values of electron affinities A n and ionization potentials I n for n … can inform their applications. ACKNOWLEDGMENTS The authors gratefully acknowledge valuable com- ments on the manuscript by B. Dunlap of the U.S. Naval Research Laboratory and W. Bunting of … , Technical Report MP 05W0000272 (The MITRE Corp., McLean, Virginia, USA, 2006) Available online at URL: https://www.mitre.org/sites/ default/files/pdf/06 0667.pdf [5] G. R. Lewis, W. E. …

Utah Innovation Center: An Innovation Partnership between Government, Industry, and Academia

Publication
September 12, 2016
… provides an overview of innovation best practices, then describes the principal steps required to establish and maintain a sponsoring innovation partnership. This paper provides best practices … between Government, Industry, and Academia The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official … 2011. 24 14. Data Governance Institute, Data Governance Framework, http://www.datagovernance.com/the-dgi-framework/, accessed on 13 March 2015. 15. Software Engineering Institute, Capability …

A Potency Relation for Worms and Next-Generation Attack Tools

Publication
March 01, 2002
… tools and contrast it with contemporary worms, and outline a methodology that can be used to express the potency of the threat. We describe the attributes that span the space of attack … (via a start or stop command). A typical order is to start (or stop) attacking target.host.com with a ping of death attack and is directed to the set of intended attackers. With a little … automate penetration testing. Voyager Alpha Force is a tool that was described briefly in an online news article [16] that claims mobility and coordination. However, this author has no …

Software Instrumentation for Intelligent Embedded Training

Publication
June 01, 2001
… may be general purpose, such as word-processing and spreadsheet tools, or tailored to specific mission functions, such as systems for air-traffic management and military "command … and the training system are distinct, interop- erating software packages running in the same com- puting environment, and resident on the same computer workstation.) Experience has shown … some military C2 systems are arriving with such web- based checklists. One problem with online checklists is that users must navigate them manually, not only se- lecting the appropriate …

Sensor Data & Analysis Framework (SDAF) Data Warehouse

Publication
February 01, 2007
… more and more sensors are producing volumes of data regarding objects that change with respect to location and time, evaluating this stream of information in a timely fashion requires the integration of current and historical data. The SDAF research … the partition with the newly inserted data is not available. All other data partitions are online and ready for query operations. 4.2 Spatial Partition Pruning Spatial partition pruning is …
  • First page
  • Previous page
  • …
  • Page 118
  • Page 119
  • Page 120
  • Page 121
  • Current page 122
  • Page 123
  • Page 124
  • Page 125
  • Page 126
  • …
  • Next page
  • Last page
Displaying 1211 - 1220 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links