Sciweavers

6757 search results - page 1231 / 1352
» Knowledge Analysis on Process Models
Sort
View
CCS
2010
ACM
15 years 4 months ago
Practical ID-based encryption for wireless sensor network
In this paper, we propose a new practical identity-based encryption scheme which is suitable for wireless sensor network (WSN). We call it Receiver-Bounded Online/Offline Identity...
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng...
INTERACTION
2009
ACM
15 years 4 months ago
DTD2OWL: automatic transforming XML documents into OWL ontology
DTD and its instance have been considered the standard for data representation and information exchange format on the current web. However, when coming to the next generation of w...
Pham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee
CGI
1997
IEEE
15 years 1 months ago
An Algorithm for Polygon Subdivision Based on Vertex Normals
In order to achieve the impression of a smooth surface while rendering a polygon mesh, normal vector vectors may be provided in the vertices of the mesh that are the average of th...
Cornelius W. A. M. van Overveld, Brian Wyvill
ICAI
2008
14 years 11 months ago
Nonrestrictive Concept-Acquisition by Representational Redescription
coarse procedures or very abstract frames from the point of view of algorithm, because some crucial issues like the representation, evolution, storage, and learning process of conc...
Hui Wei, Yan Chen
EACL
2003
ACL Anthology
14 years 11 months ago
Topological Parsing
We present a new grammar formalism for parsing with freer word-order languages, motivated by recent linguistic research in German and the Slavic languages. Unlike CFGs, these gram...
Gerald Penn, Mohammad Haji-Abdolhosseini
« Prev « First page 1231 / 1352 Last » Next »