Sciweavers

8067 search results - page 259 / 1614
» A Model Proposal of the Interoperability Problem
Sort
View
NAACL
2010
15 years 2 months ago
Unsupervised Modeling of Twitter Conversations
We propose the first unsupervised approach to the problem of modeling dialogue acts in an open domain. Trained on a corpus of noisy Twitter conversations, our method discovers dia...
Alan Ritter, Colin Cherry, Bill Dolan
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 11 months ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
ICIAP
2007
ACM
16 years 4 months ago
Stereo-based 3D Face Modeling using Annealing in Local Energy Minimization
In the past few years, 3D face modeling has gained significant attention. Reliable modeling of the face is necessary for good performance of a 3D assisted face recognition system....
Shafik Huq, Besma R. Abidi, Mongi A. Abidi
ICAC
2007
IEEE
15 years 10 months ago
Approximation Modeling for the Online Performance Management of Distributed Computing Systems
—A promising method of automating management tasks in computing systems is to formulate them as control or optimization problems in terms of performance metrics. For an online op...
Dara Kusic, Nagarajan Kandasamy, Guofei Jiang
IEEEHPCS
2010
15 years 2 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...