Sciweavers

773 search results - page 122 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
LREC
2010
176views Education» more  LREC 2010»
15 years 3 months ago
There's no Data like More Data? Revisiting the Impact of Data Size on a Classification Task
In the paper we investigate the impact of data size on a Word Sense Disambiguation task (WSD). We question the assumption that the knowledge acquisition bottleneck, which is known...
Ines Rehbein, Josef Ruppenhofer
MASCOTS
2007
15 years 3 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon
APVIS
2004
15 years 3 months ago
Adding Filtering to Geometric Distortion to Visualize a Clustered Graph on Small Screens.
Presenting large amounts of information in a limited screen space is a significant challenge in the field of Information Visualization. With the rapid development and growing use ...
Wanchun Li, Masahiro Takatsuka
ECIS
2004
15 years 3 months ago
From mass customization to collaborative customer co-design
The idea of integrating users into the design and production process is a promising strategy for companies being forced to react to the growing individualization of demand. The us...
Frank Thomas Piller, Petra Schubert, Michael Koch,...
FORTE
2004
15 years 3 months ago
Formal Composition of Distributed Scenarios
Eliciting, modeling, and analyzing the requirements are the main challenges to face up when you want to produce a formal specification for distributed systems. The distribution and...
Aziz Salah, Rabeb Mizouni, Rachida Dssouli, Benoit...