Sciweavers

10263 search results - page 2013 / 2053
» From Use Cases to System Operation Specifications
Sort
View
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
14 years 11 days ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
AAAI
2004
13 years 10 months ago
Interactive Information Extraction with Constrained Conditional Random Fields
Information Extraction methods can be used to automatically "fill-in" database forms from unstructured data such as Web documents or email. State-of-the-art methods have...
Trausti T. Kristjansson, Aron Culotta, Paul A. Vio...
ECIS
2000
13 years 10 months ago
Metadata-Based Integration of Qualitative and Quantitative Information Resources Approaching Knowledge Management
This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Bodo Rieger, Anja Kleber, Eitel von Maur
JOT
2008
228views more  JOT 2008»
13 years 8 months ago
Adapting the User Interface of Integrated Development Environments (IDEs) for Novice Users
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
CANDC
2004
ACM
13 years 8 months ago
The iProClass integrated database for protein functional analysis
Increasingly, scientists have begun to tackle gene functions and other complex regulatory processes by studying organisms at the global scales for various levels of biological org...
Cathy H. Wu, Hongzhan Huang, Anastasia N. Nikolska...
« Prev « First page 2013 / 2053 Last » Next »