Sciweavers

4636 search results - page 728 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
CCS
2008
ACM
15 years 1 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
FSE
2008
Springer
91views Cryptology» more  FSE 2008»
15 years 20 days ago
SWIFFT: A Modest Proposal for FFT Hashing
We propose SWIFFT, a collection of compression functions that are highly parallelizable and admit very efficient implementations on modern microprocessors. The main technique under...
Vadim Lyubashevsky, Daniele Micciancio, Chris Peik...
EMNLP
2008
15 years 17 days ago
Bayesian Unsupervised Topic Segmentation
This paper describes a novel Bayesian approach to unsupervised topic segmentation. Unsupervised systems for this task are driven by lexical cohesion: the tendency of wellformed se...
Jacob Eisenstein, Regina Barzilay
SOCRATES
2008
151views Education» more  SOCRATES 2008»
15 years 17 days ago
Learning Translation Strategies in a CSCL Framework
This study investigated the extent to which the social constructivist approach can be applied to the teaching/learning of translation strategies in an e-learning environment. To a...
Viviana Gaballo
EUMAS
2006
15 years 16 days ago
E*plore-ing the Simulation Design Space
One of the major puzzles in performing multi-agent-based simulations is the validity of their results. Optimisation of simulation parameters can lead to results that can be deceit...
Luis Antunes, Helder Coelho, João Balsa