Sciweavers

15088 search results - page 2973 / 3018
» Evaluation of NLP systems
Sort
View
97
Voted
CN
2008
98views more  CN 2008»
15 years 14 days ago
Description and simulation of dynamic mobility networks
During the last decade, the study of large scale complex networks has attracted a substantial amount of attention and works from several domains: sociology, biology, computer scie...
Antoine Scherrer, Pierre Borgnat, Eric Fleury, Jea...
125
Voted
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 14 days ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 14 days ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 14 days ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth
91
Voted
CORR
2010
Springer
180views Education» more  CORR 2010»
15 years 13 days ago
Dependability in Aggregation by Averaging
Abstract. Aggregation is an important building block of modern distributed applications, allowing the determination of meaningful properties (e.g. network size, total storage capac...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
« Prev « First page 2973 / 3018 Last » Next »