Sciweavers

2045 search results - page 363 / 409
» The open network laboratory
Sort
View
ACL
2009
13 years 5 months ago
Incremental HMM Alignment for MT System Combination
Inspired by the incremental TER alignment, we re-designed the Indirect HMM (IHMM) alignment, which is one of the best hypothesis alignment methods for conventional MT system combi...
Chi-Ho Li, Xiaodong He, Yupeng Liu, Ning Xi
BIS
2009
112views Business» more  BIS 2009»
13 years 5 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
EUSFLAT
2009
124views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
A toward Framework for Generic Uncertainty Management
The need for an automatic inference process able to deal with information coming from unreliable sources is becoming a relevant issue both on corporate networks and on the open Web...
Ernesto Damiani, Paolo Ceravolo, Marcello Leida
GI
2009
Springer
13 years 5 months ago
An Adaptative Framework for Tracking Web-based Learning Environments
: Collecting and sharing attention information represents a main concern within the Technology Enhanced Learning community, as the number of works or projects related to this topic...
Valentin Butoianu, Philippe Vidal, Julien Broisin
ISCI
2010
146views more  ISCI 2010»
13 years 4 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...