Sciweavers

439 search results - page 68 / 88
» Context and Intent in Call Processing
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
14 years 11 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
IVS
2006
84views more  IVS 2006»
14 years 11 months ago
Finding and understanding reusable designs from large hierarchical repositories
This paper describes a prototype called CoMem (Corporate Memory) that supports the finding and understanding of useful items in large hierarchical repositories. The particular dom...
Peter Demian, Renate Fruchter
JUCS
2008
148views more  JUCS 2008»
14 years 11 months ago
SHARP Online: An Adaptive Hypermedia System Applied to Mathematical Problem Solving
: In this article we present the development of a web application called SHARP Online: An Adaptive Hypermedia System Applied to Mathematical Problem Solving. The pedagogical basis ...
Ana Belén Gil, Raquel Rodríguez, Fra...
61
Voted
CORR
2002
Springer
87views Education» more  CORR 2002»
14 years 11 months ago
Rerendering Semantic Ontologies: Automatic Extensions to UMLS through Corpus Analytics
In this paper, we discuss the utility and deficiencies of existing ontology resources for a number of language processing applications. We describe a technique for increasing the ...
James Pustejovsky, Anna Rumshisky, José M. ...
DPD
1998
141views more  DPD 1998»
14 years 11 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...