Sciweavers

1893 search results - page 193 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
IJNSEC
2006
107views more  IJNSEC 2006»
15 years 4 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
CAD
2000
Springer
15 years 4 months ago
Lessons learned developing protocols for the industrial virtual enterprise
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...
ATAL
2009
Springer
15 years 11 months ago
MABLE: a framework for learning from natural instruction
The Modular Architecture for Bootstrapped Learning Experiments (MABLE) is a system that is being developed to allow humans to teach computers in the most natural manner possible: ...
Roger Mailler, Daniel Bryce, Jiaying Shen, Ciaran ...
AAAI
1993
15 years 6 months ago
A Method for Development of Dialogue Managers for Natural Language Interfaces
This paper describes a method for the development of dialogue managers for natural language interfaces. A dialogue manager is presented designed on the basis of both a theoretical...
Arne Jönsson
HICSS
2009
IEEE
168views Biometrics» more  HICSS 2009»
15 years 11 months ago
Enabling Distributed Model Management Using Semantic Web Technologies
In today’s increasingly dynamic and competitive business environment, organizations strive to leverage their information resources to gain and sustain competitive advantage. Deci...
Amit V. Deokar, Omar F. El-Gayar