Sciweavers

192 search results - page 22 / 39
» Computer Assisted Grammar Construction
Sort
View
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
BMCBI
2006
102views more  BMCBI 2006»
13 years 8 months ago
MycoperonDB: a database of computationally identified operons and transcriptional units in Mycobacteria
Background: A key post genomics challenge is to identify how genes in an organism come together and perform physiological functions. An important first step in this direction is t...
Sarita Ranjan, Ranjit Kumar Gundu, Akash Ranjan
PPDP
2009
Springer
14 years 3 months ago
Set functions for functional logic programming
We propose a novel approach to encapsulate non-deterministic computations in functional logic programs. Our approach is based on set functions that return the set of all the resul...
Sergio Antoy, Michael Hanus
AGENTCL
2003
Springer
14 years 1 months ago
A Cooperative Dialogue Game for Resolving Ontological Discrepancies
The goal of this paper is to present a computational framework that enables us to generate elementary speech act sequences in a dialogue between an electronic assistant and a compu...
Robbert-Jan Beun, Rogier M. van Eijk
GD
1997
Springer
14 years 20 days ago
Orthogonal 3-D Graph Drawing
This paper studies 3-D orthogonal grid drawings for graphs of arbitrary degree, in particular Kn, with vertices drawn as boxes. It establishes asymptotic lower bounds for the volu...
Therese C. Biedl, Thomas C. Shermer, Sue Whiteside...