Sciweavers

812 search results - page 141 / 163
» A Complete Guide to the Future
Sort
View
CSFW
2002
IEEE
15 years 2 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
DAS
2010
Springer
15 years 2 months ago
Analysis of whole-book recognition
Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images, attempting to improve accuracy by automatic unsupervised ...
Pingping Xiu, Henry S. Baird
SIGUCCS
2000
ACM
15 years 2 months ago
Implementing LIES (Location Independent Email Service)
This paper will provide a useful guide to those schools that have not yet implemented IMAP and are considering doing so. With both the systems and user services perspectives, any ...
Pamela Vogel, John Spadaro
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
15 years 1 months ago
New perspectives and methods in link prediction
This paper examines important factors for link prediction in networks and provides a general, high-performance framework for the prediction task. Link prediction in sparse network...
Ryan Lichtenwalter, Jake T. Lussier, Nitesh V. Cha...
EELC
2006
125views Languages» more  EELC 2006»
15 years 1 months ago
How Do Children Develop Syntactic Representations from What They Hear?
nstructional schemas, both specific and abstract. Children are thought to start out with concrete pieces of language and to gradually develop more schematic constructions. All cons...
Elena Lieven