Sciweavers

8636 search results - page 1508 / 1728
» How Developers Copy
Sort
View
140
Voted
NIPS
2004
15 years 5 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
143
Voted
ODRL
2004
15 years 5 months ago
Nonius: Implementing a DRM Extension to an XML Browser
The paper describes experiences, ideas, and problems that were discovered while developing a digital rights management (DRM) extension to an XML browser. The supported rights desc...
Olli Pitkänen, Ville Saarinen, Jari Anttila, ...
130
Voted
OPODIS
2004
15 years 5 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
143
Voted
PUK
2001
15 years 5 months ago
Web-based Commerce of Complex Products and Services with Multiple Suppliers
The sales of customisable products and services over the internet is a challenging task within the area of electronic commerce. In this chapter we will present a case study which s...
Liliana Ardissono, Alexander Felfernig, Gerhard Fr...
154
Voted
IJCAI
2003
15 years 5 months ago
Bayesian Information Extraction Network
Dynamic Bayesian networks (DBNs) offer an elegant way to integrate various aspects of language in one model. Many existing algorithms developed for learning and inference in DBNs ...
Leonid Peshkin, Avi Pfeffer
« Prev « First page 1508 / 1728 Last » Next »