Sciweavers

ISICT
2003
13 years 10 months ago
A new approach for distributed computing in avionics systems
Historically, a typical avionics system architecture has been designed as a federated architecture of black-boxes with well-defined functions and implemented on fully dedicated co...
Miguel A. Sánchez-Puebla, Jesús Carr...
ISICT
2003
13 years 10 months ago
Spam filters: bayes vs. chi-squared; letters vs. words
We compare two statistical methods for identifying spam or junk electronic mail. Spam filters are classifiers which determine whether an email is junk or not. The proliferation ...
Cormac O'Brien, Carl Vogel
ISICT
2003
13 years 10 months ago
The influence of semantics in IR using LSI and K-means clustering techniques
In this paper we study the influence of semantics in the information retrieval preprocessing. We concretely compare the reached performance with stemming and semantic lemmatizatio...
Daniel Jiménez, Edgardo Ferretti, Vicente V...
ISICT
2003
13 years 10 months ago
Digital document life cycle development
Project MEMORIAL [3] is aimed at developing a new technology for creating Web based information systems using interactive electronic documents extracted from their paper originals...
Henryk Krawczyk, Bogdan Wiszniewski
ISICT
2003
13 years 10 months ago
Inducing a cline from corpora of political manifestos
Techniques from corpus linguistics are applied to the analysis of a number of European right-wing parties in an effort to extend methods for ranking parties on a left-right spectr...
Sofie Van Gijsel, Carl Vogel
ISICT
2003
13 years 10 months ago
The language of machines
When we start to engage machines in conversation, what language will it be? While natural language is our preferred means of communication, natural language processing is by no mea...
Eva Jacobus, Brian R. Duffy
ISICT
2003
13 years 10 months ago
Structure free highway toll collection using non-repudiated tickets
This paper proposes a concept of how to collect toll on highways. Unlike any existing method, the proposed approach requires no structure to be built on highways for the toll coll...
Nol Premasathian, Somying Thainimit
ISICT
2003
13 years 10 months ago
Next generation context aware adaptive services
Situational information can enrich the interactions between a user and the services they wish to utilize. Such information encompasses details about the user, the physical environ...
Owen Conlan, Ruaidhri Power, Steffen Higel, Declan...
ISICT
2003
13 years 10 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
ISICT
2003
13 years 10 months ago
Topic maps for context management
Abstract. The advent of context-aware computing requires a new paradigm in information management. Context information in a computing environment will take the form of disparate an...
Ruaidhri Power