Sciweavers

9425 search results - page 1833 / 1885
» Some Notes on Models and Modelling
Sort
View
IADIS
2003
14 years 11 months ago
Improving Quality of Education through the Use of Intranet
Higher educational institutions are just like companies forced to adapt to the ever faster changing environment. There are several obstacles in the way of introducing e-learning i...
Jaka Linic, Jurij Jaklic, Mojca Indihar Stemberger
SIROCCO
2004
14 years 11 months ago
Asynchronous Broadcast in Radio Networks
Abstract. We study asynchronous packet radio networks in which transmissions among nodes may be delayed. We consider the task of broadcasting a message generated by the source node...
Bogdan S. Chlebus, Mariusz A. Rokicki
MC
2003
157views Computer Science» more  MC 2003»
14 years 11 months ago
From Adaptive Hypermedia to the Adaptive Web
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Peter Brusilovsky
AAAI
2000
14 years 11 months ago
PROMPT: Algorithm and Tool for Automated Ontology Merging and Alignment
Researchers in the ontology-design field have developed the content for ontologies in many domain areas. Recently, ontologies have become increasingly common on the WorldWide Web ...
Natalya Fridman Noy, Mark A. Musen
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
14 years 11 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
« Prev « First page 1833 / 1885 Last » Next »