Sciweavers

10891 search results - page 1595 / 2179
» Combining Model Reductions
Sort
View
DBSEC
1998
115views Database» more  DBSEC 1998»
15 years 6 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
161
Voted
IC
2000
15 years 6 months ago
Virtual Campus: A Web-Based Customized Learning Environment
Abstract Virtual Campus is an Internet application in education. It combines the advantages of both group and individual learning approaches based on advanced network technologies....
Ka-po Ma, Michael R. Lyn, Wing-Kay Kan
118
Voted
ACL
1997
15 years 6 months ago
Predicting the Semantic Orientation of Adjectives
We identify and validate from a large corpus constraints from conjunctions on the positive or negative semantic orientation of the conjoined adjectives. A log-linear regression mo...
Vasileios Hatzivassiloglou, Kathleen McKeown
IJCAI
1997
15 years 6 months ago
Implementing BDI-like Systems by Direct Execution
While the Belief, Desire, Intention (BDI) framework is one of the most influential and appealing approaches to rational agent architectures, a gulf often exists between the high-l...
Michael Fisher
TREC
2000
15 years 6 months ago
The PISAB Question Answering System
The PISAB Question Answering system is based on a combination of Information Extraction and Information Retrieval techniques. Knowledge extracted from documents is modeled as a se...
Giuseppe Attardi, Cristian Burrini
« Prev « First page 1595 / 2179 Last » Next »