Sciweavers

15635 search results - page 2935 / 3127
» A Designing Model of XML-Dataweb
Sort
View
HT
1987
ACM
15 years 7 months ago
Exploring Representation Problems Using Hypertext
Hypertext is a technology well-suited to exploring different kinds of representational problems. It can be used first as an informal mechanism to describe the attributes of object...
Catherine C. Marshall
126
Voted
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
DEBS
2009
ACM
15 years 6 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
FAST
2010
15 years 5 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
126
Voted
FLAIRS
2007
15 years 5 months ago
Assessing Entailer with a Corpus of Natural Language from an Intelligent Tutoring System
In this study, we compared Entailer, a computational tool that evaluates the degree to which one text is entailed by another, to a variety of other text relatedness metrics (LSA, ...
Philip M. McCarthy, Vasile Rus, Scott A. Crossley,...
« Prev « First page 2935 / 3127 Last » Next »