Sciweavers

8377 search results - page 1600 / 1676
» Scenarios - Introduction
Sort
View
FUIN
2006
98views more  FUIN 2006»
14 years 12 months ago
On-line Approximate String Matching in Natural Language
We consider approximate pattern matching in natural language text. We use the words of the text as the alphabet, instead of the characters as in traditional string matching approac...
Kimmo Fredriksson
CC
2007
Springer
108views System Software» more  CC 2007»
14 years 12 months ago
Communication vs. Computation
We initiate a study of tradeoffs between communication and computation in well-known communication models and in other related models. The fundamental question we investigate is t...
Prahladh Harsha, Yuval Ishai, Joe Kilian, Kobbi Ni...
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 12 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CE
2007
133views more  CE 2007»
14 years 12 months ago
Reusable, lifelike virtual humans for mentoring and role-playing
Lifelike, interactive digital characters, serving as mentors and role-playing actors, have been shown to significantly improve learner motivation and retention. However, the cost...
Edward M. Sims
IEEESP
2006
130views more  IEEESP 2006»
14 years 12 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
« Prev « First page 1600 / 1676 Last » Next »