Sciweavers

3686 search results - page 558 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
SMC
2007
IEEE
112views Control Systems» more  SMC 2007»
14 years 2 months ago
A tool for role-based chatting
Role-based collaboration (RBC) is proposed to support people’s collaboration with more usable human-computer interfaces. To approach the objectives of RBC, new practical tools a...
Haibin Zhu, Rob Alkins
SIGMOD
2010
ACM
312views Database» more  SIGMOD 2010»
14 years 28 days ago
TwitterMonitor: trend detection over the twitter stream
We present TwitterMonitor, a system that performs trend detection over the Twitter stream. The system identifies emerging topics (i.e. ‘trends’) on Twitter in real time and p...
Michael Mathioudakis, Nick Koudas
PDPTA
2000
13 years 9 months ago
Monitoring Mobile Code
Code Mobility brings the possibility of building distributed systems better suited to a range of application areas. While platforms supporting Code Mobility are already in use, su...
Fernando Luís Dotti, Lucio Mauro Duarte
EACL
1989
ACL Anthology
13 years 9 months ago
It Would Be Much Easier If WENT Were GOED
The paper proposes a paradigmatic approach to morphological knowledge acquisition. It addresses the problem of learning from examples rules for word-forms analysis and synthesis. ...
Dan Tufis
SRDS
2010
IEEE
13 years 6 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...