Sciweavers

9739 search results - page 1912 / 1948
» Object-Oriented Analysis and Design
Sort
View
JUCS
2008
112views more  JUCS 2008»
13 years 8 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
ENGL
2007
80views more  ENGL 2007»
13 years 8 months ago
Movement Compatibility for Rotary Control and Digital Display
— Using real mechanical controls, this experiment studied strength and reversibility of direction-of-motion stereotypes and response times for different configurations of digital...
W. H. Chan, Alan H. S. Chan
MONET
2008
77views more  MONET 2008»
13 years 8 months ago
On Relay Node Placement and Assignment for Two-tiered Wireless Networks
Wireless networks that operate on batteries are imposed with energy constraints and long distance communications between nodes are not desirable. Implementing Relay Nodes (RNs) can...
Wenxuan Guo, Xin-Ming Huang, Wenjing Lou, Cao Lian...
NLE
2008
118views more  NLE 2008»
13 years 8 months ago
Part-of-speech tagging of Modern Hebrew text
Words in Semitic texts often consist of a concatenation of word segments, each corresponding to a Part-of-Speech (POS) category. Semitic words may be ambiguous with regard to thei...
Roy Bar-Haim, Khalil Sima'an, Yoad Winter
« Prev « First page 1912 / 1948 Last » Next »