Sciweavers

457 search results - page 58 / 92
» Boolean algebras arising from information systems
Sort
View
PERVASIVE
2006
Springer
14 years 9 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
TCS
2008
14 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
AMC
2008
94views more  AMC 2008»
14 years 10 months ago
Modeling and inversion of net ecological exchange data using an Ito stochastic differential equation approach
A system of stochastic differential equations is studied describing a compartmental carbon transfer model that includes uncertainties arising in the model from environmental and p...
Luther White, Yiqi Luo
JAIR
2008
118views more  JAIR 2008»
14 years 9 months ago
On the Use of Automatically Acquired Examples for All-Nouns Word Sense Disambiguation
This article focuses on Word Sense Disambiguation (WSD), which is a Natural Language Processing task that is thought to be important for many Language Technology applications, suc...
David Martínez, Oier Lopez de Lacalle, Enek...
AVI
2006
14 years 11 months ago
Exploring visual feedback of change conflict in a distributed 3D environment
Teams that are geographically distributed often share information both in real-time and asynchronously. When such sharing is through groupware, change conflicts can arise when peo...
Mark S. Hancock, John David Miller, Saul Greenberg...