Sciweavers

2078 search results - page 310 / 416
» Using Aspects to Make Adaptive Object-Models Adaptable
Sort
View
131
Voted
ASIACRYPT
2009
Springer
15 years 6 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
AIIDE
2008
15 years 5 months ago
Intelligent Trading Agents for Massively Multi-player Game Economies
As massively multi-player gaming environments become more detailed, developing agents to populate these virtual worlds as capable non-player characters poses an increasingly compl...
John Reeder, Gita Sukthankar, Michael Georgiopoulo...
137
Voted
BIS
2007
173views Business» more  BIS 2007»
15 years 4 months ago
Natural Language Technology for Information Integration in Business Intelligence
Business intelligence requires the collecting and merging of information from many different sources, both structured and unstructured, in order to analyse for example financial ...
Diana Maynard, Horacio Saggion, Milena Yankova, Ka...
135
Voted
LREC
2010
216views Education» more  LREC 2010»
15 years 4 months ago
Efficient Spoken Dialogue Domain Representation and Interpretation
We provide a detailed look on the functioning of the OwlSpeak Spoken Dialogue Manager, which is part of the EU-funded project ATRACO. OwlSpeak interprets Spoken Dialogue Ontologie...
Tobias Heinroth, Dan Denich, Alexander Schmitt, Wo...
120
Voted
LREC
2008
144views Education» more  LREC 2008»
15 years 4 months ago
A Hybrid Morphology-Based POS Tagger for Persian
In many applications of natural language processing (NLP) grammatically tagged corpora are needed. Thus Part of Speech (POS) Tagging is of high importance in the domain of NLP. Ma...
Mehrnoush Shamsfard, Hakimeh Fadaei