Sciweavers

970 search results - page 144 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
CEAS
2005
Springer
14 years 1 months ago
Comparative Graph Theoretical Characterization of Networks of Spam
Email is an increasingly important and ubiquitous means of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. Ho...
Luíz Henrique Gomes, Rodrigo B. Almeida, Lu...
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
14 years 1 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
EGC
2005
Springer
14 years 1 months ago
Telemedical Applications and Grid Technology
In recent years different institutions have launched several telemedicine projects which aimed to encourage the Euro-Mediterranean cooperation. The creation of a Virtual Euro-Medit...
Georgi Graschew, Theo A. Roelofs, Stefan Rakowsky,...
IJCNLP
2005
Springer
14 years 1 months ago
Web-Based Terminology Translation Mining
Mining terminology translation from a large amount of Web data can be applied in many fields such as reading/writing assistant, machine translation and cross-language information r...
Gaolin Fang, Hao Yu, Fumihito Nishino
ISMDA
2005
Springer
14 years 1 months ago
The Ontological Lens: Zooming in and out from Genomic to Clinical Level
Abstract. Ontology is the talk of the day in the medical informatics comm.unity. Its relevant role in the design and implementation of information systems in health care is now wid...
Domenico M. Pisanelli, Francesco Pinciroli, Marco ...