Sciweavers

1268 search results - page 119 / 254
» One Logic to Use Them All
Sort
View
103
Voted
EACL
1989
ACL Anthology
15 years 1 months ago
Computational Semantics Of Mass Terms
Although the formalisms normally used for describing the semantics of natural languages are far from computationally tractable, it is possible to isolate particular semantic pheno...
Jan Tore Lønning
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 22 days ago
A New General Transparency Model for Block-based Watermarking Method
Blocking artifact is one of the main drawbacks of the block-based watermarking method. Though a number of researches on "transparent" digital watermarking system have be...
Fangjun Huang
72
Voted
AI
2005
Springer
15 years 20 days ago
The complexity of contract negotiation
The use of software agents for automatic contract negotiation in e-commerce and e-trading ents has been the subject of considerable recent interest. A widely studied abstract mode...
Paul E. Dunne, Michael Wooldridge, Michael Laurenc...
104
Voted
COMBINATORICS
2000
82views more  COMBINATORICS 2000»
15 years 17 days ago
The Strongly Regular (40, 12, 2, 4) Graphs
In a previous paper it was established that there are at least 27 non-isomorphic strongly regular (40, 12, 2, 4) graphs. Using a different and more efficient method we have re-inv...
Edward Spence
92
Voted
JAIR
2010
99views more  JAIR 2010»
14 years 11 months ago
Developing Approaches for Solving a Telecommunications Feature Subscription Problem
Call control features (e.g., call-divert, voice-mail) are primitive options to which users can subscribe off-line to personalise their service. The configuration of a feature su...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...