Sciweavers

2604 search results - page 260 / 521
» Human Errors and System Requirements
Sort
View
PERCOM
2008
ACM
14 years 9 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
JCDL
2006
ACM
75views Education» more  JCDL 2006»
14 years 3 months ago
Quantifying the accuracy of relational statements in Wikipedia: a methodology
The Perseus Project at Tufts University produces tools to enhance the study of humanities texts. Perseus’ new named-entity browser lets users browse an index of references to pe...
Gabriel Weaver, Barbara Strickland, Gregory Crane
WEBI
2005
Springer
14 years 3 months ago
An EM Based Training Algorithm for Cross-Language Text Categorization
Due to the globalization on the Web, many companies and institutions need to efficiently organize and search repositories containing multilingual documents. The management of the...
Leonardo Rigutini, Marco Maggini, Bing Liu
VRST
2000
ACM
14 years 2 months ago
Choosing and using a driving problem for CVE technology development
The need for a real-world driving problem to guide technology development has long been recognised. However, this does not guarantee the identification of requirements for technol...
William L. Mitchell, Daphne Economou, Steve Pettif...
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 11 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet