Sciweavers

568 search results - page 58 / 114
» The Great Language Debate
Sort
View
ICITA
2005
IEEE
15 years 5 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
ITICSE
2005
ACM
15 years 5 months ago
Novice Java programmers' conceptions of "object" and "class", and variation theory
Problems with understanding concepts, so called misconceptions, have been investigated and reported in a number of studies regarding object-oriented programming [4], [3]. In a fi...
Anna Eckerdal, Michael Thuné
CIVR
2005
Springer
205views Image Analysis» more  CIVR 2005»
15 years 5 months ago
Automatic Image Semantic Annotation Based on Image-Keyword Document Model
Abstract. This paper presents a novel method of automatic image semantic annotation. Our approach is based on the Image-Keyword Document Model (IKDM) with image features discretiza...
Xiangdong Zhou, Lian Chen, Jianye Ye, Qi Zhang, Ba...
CIKM
2004
Springer
15 years 5 months ago
A framework for selective query expansion
Query expansion is a well-known technique that has been shown to improve average retrieval performance. This technique has not been used in many operational systems because of the...
Stephen Cronen-Townsend, Yun Zhou, W. Bruce Croft
IEAAIE
2003
Springer
15 years 5 months ago
Dialogue Management in an Automatic Meteorological Information System
Abstract. In this paper we present a real automatic meteorological information system that, not only provides friendly voice access to realtime data coming from automatic sensors, ...
Luis Villarejo, Núria Castell, Javier Herna...