Sciweavers

1192 search results - page 40 / 239
» Computing Weakest Readings
Sort
View
CIS
2007
Springer
15 years 9 months ago
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks
ct This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant ...
Shih-I Huang, Shiuhpyng Shieh
117
Voted
COLING
2002
15 years 3 months ago
Bringing the Dictionary to the User: The FOKS System
The dictionary look-up of unknown words is particularly difficult in Japanese due to the complicated writing system. We propose a system which allows learners of Japanese to look ...
Slaven Bilac, Timothy Baldwin, Hozumi Tanaka
139
Voted
ICIDS
2010
Springer
15 years 2 months ago
Motivations for Rereading in Interactive Stories: A Preliminary Investigation
This paper describes a preliminary investigation into the concept of rereadability in interactive stories. Through a close reading of the text-based interactive fiction Alabaster, ...
Alex Mitchell
321
Voted

Tutorial
6175views
17 years 1 months ago
Vector Math for 3D Computer Graphics
"This is a tutorial on vector algebra and matrix algebra from the viewpoint of computer graphics. It covers most vector and matrix topics needed to read college-level computer...
Central Connecticut State University, Computer Sci...
122
Voted
JETAI
2007
111views more  JETAI 2007»
15 years 3 months ago
Contextual vocabulary acquisition as computational philosophy and as philosophical computation
Contextual vocabulary acquisition (CVA) is the active, deliberate acquisition of a meaning for an unknown word in a text by reasoning from textual clues, prior knowledge, and hypo...
William J. Rapaport, Michael W. Kibby