Sciweavers

8087 search results - page 1396 / 1618
» Meta Data Management
Sort
View
WS
2004
ACM
15 years 10 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
168
Voted
AMTA
2004
Springer
15 years 10 months ago
Interlingual Annotation for MT Development
MT systems that use only superficial representations, including the current generation of statistical MT systems, have been successful and useful. However, they will experience a p...
Florence Reeder, Bonnie J. Dorr, David Farwell, Ni...
CIKM
2004
Springer
15 years 10 months ago
Evaluating window joins over punctuated streams
We explore join optimizations in the presence of both timebased constraints (sliding windows) and value-based constraints (punctuations). We present the first join solution named...
Luping Ding, Elke A. Rundensteiner
CIKM
2004
Springer
15 years 10 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
DEXA
2004
Springer
129views Database» more  DEXA 2004»
15 years 10 months ago
Using Case Based Retrieval Techniques for Handling Anomalous Situations in Advisory Dialogues
The efficacy of expert systems often depends on the accuracy and completeness of the problem specification negotiated with the user. Therefore, efficient user interfaces are needed...
Marcello L'Abbate, Ingo Frommholz, Ulrich Thiel, E...
« Prev « First page 1396 / 1618 Last » Next »