Sciweavers

2912 search results - page 519 / 583
» Overlay Networks - Implementation by Specification
Sort
View
131
Voted
CRITIS
2007
15 years 5 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
134
Voted
DGO
2007
97views Education» more  DGO 2007»
15 years 5 months ago
Interactive exploration and discovery of e-government services
Government e-services available to citizens represent one of the most frequent and critical points of contact between public administrations and citizens. In addition to common se...
Giovanni Maria Sacco
139
Voted
DAGSTUHL
2008
15 years 5 months ago
The Grand Challenges and Myths of Neural-Symbolic Computation
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
Luís C. Lamb
132
Voted
LREC
2010
201views Education» more  LREC 2010»
15 years 5 months ago
Cultural Heritage: Knowledge Extraction from Web Documents
This article presents the use of NLP techniques (text mining, text analysis) to develop specific tools that allow to create linguistic resources related to the cultural heritage d...
Eva Sassolini, Alessandra Cinini
LREC
2010
196views Education» more  LREC 2010»
15 years 4 months ago
HIFI-AV: An Audio-visual Corpus for Spoken Language Human-Machine Dialogue Research in Spanish
In this paper, we describe a new multi-purpose audio-visual database on the context of speech interfaces for controlling household electronic devices. The database comprises speec...
Fernando F. Fernández-Martínez, Juan...