Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Problems with understanding concepts, so called misconceptions, have been investigated and reported in a number of studies regarding object-oriented programming [4], [3]. In a fi...
Abstract. This paper presents a novel method of automatic image semantic annotation. Our approach is based on the Image-Keyword Document Model (IKDM) with image features discretiza...
Xiangdong Zhou, Lian Chen, Jianye Ye, Qi Zhang, Ba...
Query expansion is a well-known technique that has been shown to improve average retrieval performance. This technique has not been used in many operational systems because of the...
Abstract. In this paper we present a real automatic meteorological information system that, not only provides friendly voice access to realtime data coming from automatic sensors, ...