Sciweavers

4411 search results - page 736 / 883
» Communication Complexity and Its Applications
Sort
View
CSREAEEE
2008
79views Business» more  CSREAEEE 2008»
15 years 6 months ago
Implementing Standard Reference Models for e-learning Systems
- Active development in the field of e-Learning has led to multiple organizations and specifications that try to provide some interoperability to systems, tools and learning conten...
Juan-Manuel de Blas, Luis de Marcos, Roberto Barch...
112
Voted
LREC
2010
169views Education» more  LREC 2010»
15 years 6 months ago
Annotating Attribution Relations: Towards an Italian Discourse Treebank
In this paper we describe the development of a schema for the annotation of attribution relations and present the first findings and some relevant issues concerning this phenomeno...
Silvia Pareti, Irina Prodanof
139
Voted
FORTE
2008
15 years 6 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
142
Voted
ISCAPDCS
2007
15 years 6 months ago
A rapid heuristic for scheduling non-preemptive dependent periodic tasks onto multiprocessor
We address distributed real-time applications represented by systems of non-preemptive dependent periodic tasks. This system is described by an acyclic directed graph. Because the...
Omar Kermia, Yves Sorel
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 6 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng