Sciweavers

5544 search results - page 19 / 1109
» Three Inadequate Models
Sort
View
COLING
1994
13 years 8 months ago
Collaboration On Reference To Objects That Are Not Mutually Known
In conversation,a person sometimeshasto refer to anobjectthat is not previously known to the other participant. We present a planbased model of how agents collaborate on reference...
Philip Edmonds
COOPIS
2000
IEEE
13 years 11 months ago
Workflow Modeling Using Proclets
The focus of traditional workflow management systems is on control flow within one process definition, that describes how a single case (i.e., workflow instance) is handled in isol...
Wil M. P. van der Aalst, Paulo Barthelmess, Claren...
IADIS
2004
13 years 9 months ago
Recognizing Article Errors Based on the Three Head Words
In this paper, we present a statistical model for detecting article errors, which Japanese learners of English often make in English writing. The model detects article errors base...
Ryo Nagata, Fumito Masui, Atsuo Kawai, Naoki Isu
EUROCRYPT
2001
Springer
14 years 1 days ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
ICECCS
2000
IEEE
106views Hardware» more  ICECCS 2000»
13 years 11 months ago
Evaluation of Three Specification-Based Testing Criteria
This paper compares three specification-based testing criteria using Mathur and Wong's PROBSUBSUMES measure. The three criteria are specification-mutation coverage, full pred...
Aynur Abdurazik, Paul Ammann, Wei Ding 0003, A. Je...