Sciweavers

9218 search results - page 84 / 1844
» RFID Technology and Applications
Sort
View
LREC
2010
141views Education» more  LREC 2010»
14 years 11 months ago
Building a Textual Entailment Suite for the Evaluation of Automatic Content Scoring Technologies
Automatic content scoring for free-text responses has started to emerge as an application of Natural Language Processing in its own right, much like question answering or machine ...
Jana Z. Sukkarieh, Eleanor Bolge
CASCON
1997
97views Education» more  CASCON 1997»
14 years 11 months ago
Using shim technology to monitor DCE runtime performance
Obtaining performance data for application or system software is typically di cult, especially when the source code is not available. While popular techniques such as event trappi...
Gregory M. Oster, Richard B. Bunt
CSSE
2002
IEEE
14 years 9 months ago
A fault tolerant access to legacy database systems using CORBA technology
This work presents a software-implemented fault tolerance approach for building a reliable database application in a CORBA environment. Database applications have functional requi...
Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, ...
CHES
2007
Springer
187views Cryptology» more  CHES 2007»
15 years 4 months ago
PRESENT: An Ultra-Lightweight Block Cipher
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice....
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, ...
ICEBE
2007
IEEE
123views Business» more  ICEBE 2007»
14 years 10 months ago
Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsour...
Sergei Evdokimov, Oliver Günther