Sciweavers

2891 search results - page 102 / 579
» More or Less Elaborate
Sort
View
DGO
2003
118views Education» more  DGO 2003»
15 years 10 days ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
SFP
2001
15 years 9 days ago
The Dual of Substitution is Redecoration
: It is well known that type constructors of incomplete trees (trees with variables) carry the structure of a monad with substitution as the extension operation. Less known are the...
Tarmo Uustalu, Varmo Vene
IJCAI
2003
15 years 9 days ago
Splitting the atom: A new approach to Neighbourhood Interchangeability in Constraint Satisfaction Problems
We investigate interchangeability of values in CSPs, based on an approach where a single value in the domain of a variable can be treated as a combination of “sub-values”. An ...
James Bowen, Chavalit Likitvivatanavong
NAACL
2003
15 years 9 days ago
Cooperative model-based language understanding
In this paper, we propose a novel Cooperative Model for natural language understanding in a dialogue system. We build this based on both Finite State Model (FSM) and Statistical L...
Donghui Feng
ICMAS
1998
15 years 9 days ago
Agents in Electronic Commerce: Component Technologies for Automated Negotiation and Coalition Formation
Automated negotiation and coalition formation among self-interested agents are playing an increasingly important role in electronic commerce. Such agents cannot be coordinated by ...
Tuomas Sandholm