Sciweavers

773 search results - page 122 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
LREC
2010
176views Education» more  LREC 2010»
13 years 11 months ago
There's no Data like More Data? Revisiting the Impact of Data Size on a Classification Task
In the paper we investigate the impact of data size on a Word Sense Disambiguation task (WSD). We question the assumption that the knowledge acquisition bottleneck, which is known...
Ines Rehbein, Josef Ruppenhofer
MASCOTS
2007
13 years 11 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon
APVIS
2004
13 years 11 months ago
Adding Filtering to Geometric Distortion to Visualize a Clustered Graph on Small Screens.
Presenting large amounts of information in a limited screen space is a significant challenge in the field of Information Visualization. With the rapid development and growing use ...
Wanchun Li, Masahiro Takatsuka
ECIS
2004
13 years 11 months ago
From mass customization to collaborative customer co-design
The idea of integrating users into the design and production process is a promising strategy for companies being forced to react to the growing individualization of demand. The us...
Frank Thomas Piller, Petra Schubert, Michael Koch,...
FORTE
2004
13 years 11 months ago
Formal Composition of Distributed Scenarios
Eliciting, modeling, and analyzing the requirements are the main challenges to face up when you want to produce a formal specification for distributed systems. The distribution and...
Aziz Salah, Rabeb Mizouni, Rachida Dssouli, Benoit...