Sciweavers

368 search results - page 39 / 74
» The Information Lost in Erasures
Sort
View
COLING
2010
13 years 3 months ago
Resolving Object and Attribute Coreference in Opinion Mining
Coreference resolution is a classic NLP problem and has been studied extensively by many researchers. Most existing studies, however, are generic in the sense that they are not fo...
Xiaowen Ding, Bing Liu
JDCTA
2010
250views more  JDCTA 2010»
13 years 3 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
ICSE
2010
IEEE-ACM
13 years 6 months ago
Enhancing collaboration of multi-developer projects with synchronous changes
In a multi-developer project, team collaboration is essential for the success of the project. When team members are spread across different locations, informal interactions are lo...
Lile Hattori
ESOP
2005
Springer
14 years 2 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
ICCCN
1998
IEEE
14 years 27 days ago
Fast Recovery Protocol for Database and Link Failures in Mobile Networks
An important issue in the design of future Personal Communication Services (PCS) networks is the efficient management of location information. The current IS-41 standard P C S arc...
Govind Krishnamurthi, Stefano Chessa, Arun K. Soma...