Sciweavers

7366 search results - page 1308 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
145
Voted
ECIR
2008
Springer
15 years 6 months ago
A Document-Centered Approach to a Natural Language Music Search Engine
We propose a new approach to a music search engine that can be accessed via natural language queries. As with existing approaches, we try to gather as much contextual information a...
Peter Knees, Tim Pohle, Markus Schedl, Dominik Sch...
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
15 years 4 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
ICASSP
2011
IEEE
14 years 8 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
JAR
1998
134views more  JAR 1998»
15 years 4 months ago
Integrating Computer Algebra into Proof Planning
Mechanized reasoning systems and computer algebra systems have different objectives. Their integration is highly desirable, since formal proofs often involve both of the two differ...
Manfred Kerber, Michael Kohlhase, Volker Sorge
POPL
2000
ACM
15 years 9 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
« Prev « First page 1308 / 1474 Last » Next »