Sciweavers

504 search results - page 38 / 101
» Definitional Reflection and the Completion
Sort
View
ITS
1998
Springer
115views Multimedia» more  ITS 1998»
14 years 10 days ago
The Authoring Assistant
In some domains, including those requiring natural language understanding, we cannot build a system that can complete the entire task. One way to deal with such cases is to encode ...
Steven Ritter
ISTA
2007
13 years 10 months ago
Analytical data modeling of investment project financing process
: The present work is devoted to the research of investment projects’ financing issues. Within this paper a data analytical tool for an optimal financing schema computation on th...
Mikhail D. Godlevskiy, Valentina V. Moskalenko, Vl...
MASCOTS
2001
13 years 10 months ago
Simulation Evaluation of a Heterogeneous Web Proxy Caching Hierarchy
This paper uses trace-driven simulations to evaluate the performance of different cache management techniques for multi-level Web proxy caching hierarchies. In particular, the exp...
Mudashiru Busari, Carey L. Williamson
IJNSEC
2008
155views more  IJNSEC 2008»
13 years 8 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu
IJNSEC
2006
115views more  IJNSEC 2006»
13 years 8 months ago
Reversible Watermarking: Current Status and Key Issues
Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a novel category of watermarking schemes. It not only...
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, ...