Sciweavers

1116 search results - page 147 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CG
1998
Springer
13 years 7 months ago
Smooth transitions in texture-based simplification
We are investigating techniques for providing smooth transitions when simplifying large, static geometric models with texture-based representations (or impostors). Traditionally, ...
Daniel G. Aliaga, Anselmo Lastra
LREC
2010
129views Education» more  LREC 2010»
13 years 9 months ago
Mining Wikipedia for Large-scale Repositories of Context-Sensitive Entailment Rules
This paper focuses on the central role played by lexical information in the task of Recognizing Textual Entailment. In particular, the usefulness of lexical knowledge extracted fr...
Milen Kouylekov, Yashar Mehdad, Matteo Negri
CLUSTER
2008
IEEE
14 years 2 months ago
Intelligent compilers
—The industry is now in agreement that the future of architecture design lies in multiple cores. As a consequence, all computer systems today, from embedded devices to petascale ...
John Cavazos
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
14 years 2 months ago
Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...
Jahyun Goo, Kichan Nam
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
14 years 3 days ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara