In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Our studies have shown that as displays become larger, users leave more windows open for easy multitasking. A larger number of windows, however, may increase the time that users s...
George G. Robertson, Eric Horvitz, Mary Czerwinski...
: This paper proposes a technology for realizing a mobile network based on color signals which does not require the time and the space switching matrix for call routing. In absence...
The dot-com boom in the late 1990s attracted vast numbers of undergraduate students into the field of Information Systems (IS) with the promise of being the next "big thing&q...