Sciweavers

17049 search results - page 90 / 3410
» cans 2007
Sort
View
JETAI
2007
111views more  JETAI 2007»
13 years 8 months ago
Contextual vocabulary acquisition as computational philosophy and as philosophical computation
Contextual vocabulary acquisition (CVA) is the active, deliberate acquisition of a meaning for an unknown word in a text by reasoning from textual clues, prior knowledge, and hypo...
William J. Rapaport, Michael W. Kibby
AINA
2007
IEEE
14 years 3 months ago
Mobile Agents and the Deus Ex Machina
This paper aims to examine the benefits the introduction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.
Shane Balfe, Eimear Gallery
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 3 months ago
On Authentication with HMAC and Non-random Properties
Abstract. MAC algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial appli
Christian Rechberger, Vincent Rijmen
IJDAR
2007
100views more  IJDAR 2007»
13 years 8 months ago
Treebanks gone bad
This paper describes how a treebank of ungrammatical sentences can be created from a treebank of well-formed sentences. The treebank creation pro
Jennifer Foster
HCI
2007
13 years 10 months ago
Artificial Psychology
—In the field of human robot interaction (HRI), providing robot with emotions and psychology like human can be useful to achieve natural interaction. Previous HRI research focuse...
Zhiliang Wang