Sciweavers

2446 search results - page 279 / 490
» Principles of dataspace systems
Sort
View
127
Voted
CCS
1998
ACM
15 years 9 months ago
The Design, Implementation and Operation of an Email Pseudonym Server
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on w...
David Mazières, M. Frans Kaashoek
SIGCSE
1998
ACM
125views Education» more  SIGCSE 1998»
15 years 9 months ago
Providing intellectual focus to CS1/CS2
First-year computer science students need to see clearly that computer science as a discipline has an important intellectual role to play and that it offers deep philosophical que...
Timothy J. Long, Bruce W. Weide, Paolo Bucci, Davi...
174
Voted
GI
1997
Springer
15 years 9 months ago
Architecture and Search Organization for Large Vocabulary Continuous Speech Recognition
This paper gives an overview of an architecture and search organization for large vocabulary, continuous speech recognition (LVCSR at RWTH). In the rst part of the paper, we descri...
Stefan Ortmanns, Lutz Welling, Klaus Beulen, Frank...
OGAI
1993
15 years 9 months ago
Combining Neural Networks and Fuzzy Controllers
Fuzzy controllers are designed to work with knowledge in the form of linguistic control rules. But the translation of these linguistic rules into the framework of fuzzy set theory ...
Detlef Nauck, Frank Klawonn, Rudolf Kruse
PPCP
1993
15 years 9 months ago
Higher-Order Logic Programming as Constraint Logic Programming
Higher-order logic programming (HOLP) languages are particularly useful for various kinds of metaprogramming and theorem proving tasks because of the logical support for variable ...
Spiro Michaylov, Frank Pfenning