Sciweavers

149 search results - page 12 / 30
» What will they say
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software configuration management: a roadmap
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...
Jacky Estublier
FLAIRS
2000
13 years 8 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
IJCAI
1989
13 years 8 months ago
Layering Predictions: Flexible Use of Dialog Expectation in Speech Recognition
entional user behavior, we need a principled mannerAbstract for relaxing contextual constraints when they are violated.When computer speech recognition is used for problem In order...
Sheryl R. Young, Wayne H. Ward, Alexander G. Haupt...
CSREAEEE
2008
128views Business» more  CSREAEEE 2008»
13 years 9 months ago
Public relations System for Mobile Learning
- In this paper, we proposed an automatic pushing system, whereby the users of mobile devices set their preferences on the Internet and receive `pushed' contents, which are a ...
Chul-Woo Kim, Misook Lim, Young-Min Chin
ASUNAM
2010
IEEE
13 years 9 months ago
Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
Sofus A. Macskassy