Sciweavers

1192 search results - page 40 / 239
» Computing Weakest Readings
Sort
View
CIS
2007
Springer
15 years 6 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh
COLING
2002
14 years 11 months ago
Bringing the Dictionary to the User: The FOKS System
The dictionary look-up of unknown words is particularly difficult in Japanese due to the complicated writing system. We propose a system which allows learners of Japanese to look ...
Slaven Bilac, Timothy Baldwin, Hozumi Tanaka
ICIDS
2010
Springer
14 years 10 months ago
Motivations for Rereading in Interactive Stories: A Preliminary Investigation
This paper describes a preliminary investigation into the concept of rereadability in interactive stories. Through a close reading of the text-based interactive fiction Alabaster, ...
Alex Mitchell

Tutorial
6175views
16 years 9 months ago
Vector Math for 3D Computer Graphics
"This is a tutorial on vector algebra and matrix algebra from the viewpoint of computer graphics. It covers most vector and matrix topics needed to read college-level computer...
Central Connecticut State University, Computer Sci...
JETAI
2007
111views more  JETAI 2007»
14 years 11 months ago
Contextual vocabulary acquisition as computational philosophy and as philosophical computation
Contextual vocabulary acquisition (CVA) is the active, deliberate acquisition of a meaning for an unknown word in a text by reasoning from textual clues, prior knowledge, and hypo...
William J. Rapaport, Michael W. Kibby