Sciweavers

2517 search results - page 497 / 504
» Specifying Weak Sets
Sort
View
TCS
2008
13 years 6 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
TIT
2008
95views more  TIT 2008»
13 years 6 months ago
Error Exponent Regions for Gaussian Broadcast and Multiple-Access Channels
In modern communication systems, different users have different requirements for quality of service (QoS). In this work, QoS refers to the average codeword error probability experi...
Lihua Weng, S. Sandeep Pradhan, Achilleas Anastaso...
JITECH
2007
136views more  JITECH 2007»
13 years 6 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
MANSCI
2007
102views more  MANSCI 2007»
13 years 6 months ago
Implications of Renegotiation for Optimal Contract Flexibility and Investment
After entering into supply contracts, firms often later renegotiate the terms of those contracts. For example, firms that obtain market demand information after signing supply c...
Erica L. Plambeck, Terry A. Taylor
BMCBI
2004
144views more  BMCBI 2004»
13 years 6 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...