Sciweavers

16843 search results - page 185 / 3369
» On Generalized Authorization Problems
Sort
View
NAACL
2004
15 years 6 months ago
Robust Reading: Identification and Tracing of Ambiguous Names
A given entity, representing a person, a location or an organization, may be mentioned in text in multiple, ambiguous ways. Understanding natural language requires identifying whe...
Xin Li, Paul Morie, Dan Roth
HUC
2010
Springer
15 years 6 months ago
CU-Later: a communication system considering time difference
Despite the widespread use of technology for social communication across distance, a number of barriers to such contact still exist. One such barrier is the problem of communicati...
Hitomi Tsujita, Svetlana Yarosh, Gregory D. Abowd
COMSIS
2007
80views more  COMSIS 2007»
15 years 5 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
APIN
2005
127views more  APIN 2005»
15 years 5 months ago
Evolutionary Radial Basis Functions for Credit Assessment
Credit analysts generally assess the risk of credit applications based on their previous experience. They frequently employ quantitative methods to this end. Among the methods used...
Estefane G. M. de Lacerda, André Carlos Pon...
4OR
2010
148views more  4OR 2010»
15 years 3 months ago
Point-to-point shortest paths on dynamic time-dependent road networks
This a summary of the author's PhD thesis supervised by Leo Liberti, Philippe Baptiste and Daniel Krob and defended on 18 June 2009 at Ecole Polytechnique, Palaiseau, France. ...
Giacomo Nannicini