Sciweavers

214 search results - page 22 / 43
» An Overview of the NetWare Operating System
Sort
View
FLAIRS
2009
14 years 11 months ago
Are Ontologies Involved in Natural Language Processing?
For certain disable persons unable to communicate, we present a palliative aid which consist of a virtual pictographic keyboard associated to a text processing from a pictographic...
Maryvonne Abraham
NOSSDAV
2005
Springer
15 years 6 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
CACM
2010
97views more  CACM 2010»
14 years 10 months ago
Certified software
Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Zhong Shao
JCS
2011
87views more  JCS 2011»
14 years 8 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
BIB
2007
99views more  BIB 2007»
15 years 1 months ago
Towards a calculus of biomolecular complexes at equilibrium
An overview is presented of the construction and use of algebraic partition functions to represent the equilibrium statistical mechanics of multimolecular complexes and their acti...
Eric Mjolsness