Sciweavers

3653 search results - page 112 / 731
» Analyzing language development from a network approach
Sort
View
87
Voted
ITNG
2010
IEEE
15 years 4 months ago
Applying Semantic Web Techniques to Reservoir Engineering: Challenges and Experiences from Event Modeling
—In reservoir engineering domain experts deal with many tasks and operations, ranging from reservoir simulation to well maintenance scheduling, with the goal of maximizing oil pr...
Tao Zhu, Amol Bakshi, Viktor K. Prasanna, Karthik ...
IJCNLP
2005
Springer
15 years 4 months ago
Inversion Transduction Grammar Constraints for Mining Parallel Sentences from Quasi-Comparable Corpora
Abstract. We present a new implication of Wu’s (1997) Inversion Transduction Grammar (ITG) Hypothesis, on the problem of retrieving truly parallel sentence translations from larg...
Dekai Wu, Pascale Fung
PERCOM
2006
ACM
15 years 10 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
WSC
2001
15 years 13 days ago
Simone: large scale train network simulations
This paper describes the architecture and potentials of Simone. Simone is a simulation environment to generate, simulate and analyze complex and large scale train networks. The pu...
Dick Middelkoop, Michiel Bouwman
NDSS
2009
IEEE
15 years 5 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee