Sciweavers

1780 search results - page 283 / 356
» Polymorphic Contention Management
Sort
View
LREC
2008
216views Education» more  LREC 2008»
13 years 11 months ago
Towards Semi Automatic Construction of a Lexical Ontology for Persian
Lexical ontologies and semantic lexicons are important resources in natural language processing. They are used in various tasks and applications, especially where semantic process...
Mehrnoush Shamsfard
WICON
2008
13 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
CSREASAM
2004
13 years 11 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
I3E
2004
145views Business» more  I3E 2004»
13 years 11 months ago
Evolution of Service Processes by Rule Based Transformation
: The notion of service is closely coupled with the notion of process in general and of workflow in particular. Processes capture the coordination logic for the various resources i...
Christian Zirpins, Giacomo Piccinelli
IADIS
2004
13 years 11 months ago
Electronic case studies: a problem-based learning approach
E-Cases is an innovative approach to management development. Traditional case studies typically describe a decision or a problem in a real-life setting. E-Cases encourage students...
Philip M. Drinkwater, Christopher P. Holland, K. N...