Sciweavers

3443 search results - page 236 / 689
» More Algebras for Determiners
Sort
View
102
Voted
IADIS
2003
15 years 2 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
WSPI
2004
15 years 2 months ago
Analyzing Knowledge Management Systems: A Veritistic Approach
Knowledge management systems (KMS) are increasingly becoming popular and important in managing organizational knowledge. This motivates a closer inspection of the degree of usabili...
Palash Bera, Patrick Rysiew
RIAO
2000
15 years 2 months ago
Language sensitive text classification
It is a traditional belief that in order to scale-up to more effective retrieval and access methods modern Information Retrieval has to consider more the text content. The modalit...
Roberto Basili, Alessandro Moschitti, Maria Teresa...
102
Voted
ECRA
2007
113views more  ECRA 2007»
15 years 24 days ago
Exclusions and related trust relationships in multi-party fair exchange protocols
Some electronic commerce transactions are inherently performed between more than two parties. In this context, it is thus important to determine whether the underlying fair exchan...
Nicolás González-Deleito, Olivier Ma...
89
Voted
JETAI
2000
89views more  JETAI 2000»
15 years 19 days ago
Free will - even for robots
Human free will is a product of evolution and contributes to the success of the human animal. Useful robots will also require free will of a similar kind, and we will have to desi...
John McCarthy