Sciweavers

130 search results - page 16 / 26
» New approaches for deniable authentication
Sort
View
EMNLP
2009
13 years 6 months ago
Statistical Estimation of Word Acquisition with Application to Readability Prediction
Models of language learning play a central role in a wide range of applications: from psycholinguistic theories of how people acquire new word knowledge, to information systems th...
Paul Kidwell, Guy Lebanon, Kevyn Collins-Thompson
CIKM
2008
Springer
13 years 10 months ago
Social navigation and annotation for electronic books
Modern efforts on digitizing electronic books focus on preserving authentic "spatial" representation of the original sources. The new format requires new tools to help u...
Jae-Kyung Kim, Rosta Farzan, Peter Brusilovsky
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik
ENTCS
2006
180views more  ENTCS 2006»
13 years 8 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
CCGRID
2006
IEEE
14 years 5 days ago
Building Cyberinfrastructure for Bioinformatics Using Service Oriented Architecture
-- Cyberinfrastructure makes the development and deployment of bioinformatics applications easier by providing the framework and components that may be loosely coupled using servic...
Wilfred W. Li, Sriram Krishnan, Kurt Mueller, Kohe...