Sciweavers

3318 search results - page 208 / 664
» The Weak Instance Model
Sort
View
COMCOM
2010
129views more  COMCOM 2010»
13 years 8 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
JIB
2006
220views more  JIB 2006»
13 years 8 months ago
An assessment of machine and statistical learning approaches to inferring networks of protein-protein interactions
Protein-protein interactions (PPI) play a key role in many biological systems. Over the past few years, an explosion in availability of functional biological data obtained from hi...
Fiona Browne, Haiying Wang, Huiru Zheng, Francisco...
CAISE
2005
Springer
14 years 1 months ago
Constructing domain-specific design tools with a visual language meta-tool
Collaborative, visual design tools are typically difficult to build and evolve. We describe a meta tool for specification and generation of multiple view, multiple user visual desi...
Nianping Zhu, John C. Grundy, John G. Hosking
TSD
2004
Springer
14 years 1 months ago
How Dominant Is the Commonest Sense of a Word?
We present a mathematical model of word sense frequency distributions, and use word distributions to set parameters. The model implies that the expected dominance of the commonest ...
Adam Kilgarriff
AGENTS
1999
Springer
14 years 19 days ago
Learning to Remove Internet Advertisements
This paper discusses improving the methodology introduced in Kushmerick’s paper about learning to remove internet advertisements. The aim is to reduce the model build time as we...
Nicholas Kushmerick