Sciweavers

3013 search results - page 598 / 603
» Context-Oriented Domain Analysis
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
ENTCS
2007
153views more  ENTCS 2007»
13 years 9 months ago
The Methods of Approximation and Lifting in Real Computation
The basic motivation behind this work is to tie together various computational complexity classes, whether over different domains such as the naturals or the reals, or whether de...
Manuel Lameiras Campagnolo, Kerry Ojakian
EOR
2007
272views more  EOR 2007»
13 years 9 months ago
A dynamic logistics coordination model for evacuation and support in disaster response activities
This paper describes an integrated location-distribution model for coordinating logistics support and evacuation operations in disaster response activities. Logistics planning in ...
Wei Yi, Linet Özdamar
NAR
2008
91views more  NAR 2008»
13 years 9 months ago
GenBank
GenBank (R) is a comprehensive sequence database that contains publicly available DNA sequences for more than 119 000 different organisms, obtained primarily through the submissio...
Dennis A. Benson, Ilene Karsch-Mizrachi, David J. ...
NLE
2008
77views more  NLE 2008»
13 years 9 months ago
Generating basic skills reports for low-skilled readers
We describe SkillSum, a Natural Language Generation (NLG) system that generates a personalised feedback report for someone who has just completed a screening assessment of their b...
Sandra Williams, Ehud Reiter