Sciweavers

20175 search results - page 156 / 4035
» Is abstraction the key to computing
Sort
View
CSCWD
2007
Springer
15 years 2 months ago
Supporting Rapid Enterprise Information System Development: Key Issues and Infrastructure Construction
The difficult business reality today makes enterprises more and more resort to information technology to manage nearly everything within the enterprises and to conduct business ac...
Bo Jing, Jinlei Jiang, Meilin Shi
NIPS
2000
15 years 2 months ago
Finding the Key to a Synapse
Experimental data have shown that synapses are heterogeneous: different synapses respond with different sequences of amplitudes of postsynaptic responses to the same spike train. ...
Thomas Natschläger, Wolfgang Maass
101
Voted
COLING
2010
14 years 8 months ago
Going Beyond Traditional QA Systems: Challenges and Keys in Opinion Question Answering
The treatment of factual data has been widely studied in different areas of Natural Language Processing (NLP). However, processing subjective information still poses important cha...
Alexandra Balahur, Ester Boldrini, Andrés M...
115
Voted
IJNSEC
2011
89views more  IJNSEC 2011»
14 years 8 months ago
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s...
Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin
WS
2005
ACM
15 years 6 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...