Sciweavers

6253 search results - page 1041 / 1251
» Use Case Modeling Guidelines
Sort
View
COLING
2010
14 years 11 months ago
Exploring the Data-Driven Prediction of Prepositions in English
Prepositions in English are a well-known challenge for language learners, and the computational analysis of preposition usage has attracted significant attention. Such research ge...
Anas Elghafari, Detmar Meurers, Holger Wunsch
JSAC
2011
126views more  JSAC 2011»
14 years 11 months ago
Spectrum Management in Multiuser Cognitive Wireless Networks: Optimality and Algorithm
Abstract— Spectrum management is used to improve performance in multiuser communication system, e.g., cognitive radio or femtocell networks, where multiuser interference can lead...
Chee Wei Tan, S. Friedland, Steven H. Low
SJ
2010
136views more  SJ 2010»
14 years 10 months ago
Optimizing the Migration to Future-Generation Passive Optical Networks (PON)
We study the upgrading problem of existing Passive Optical Networks (PONs) that need to increase their capacity at different points in time. Our method upgrades line rates and migr...
M. De Andrade, Massimo Tornatore, S. Sallent, Bisw...
WWW
2003
ACM
16 years 4 months ago
Towards a multimedia formatting vocabulary
Time-based, media-centric Web presentations can be described declaratively in the XML world through the development of languages such as SMIL. It is difficult, however, to fully i...
Jacco van Ossenbruggen, Lynda Hardman, Joost Geurt...
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
16 years 4 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
« Prev « First page 1041 / 1251 Last » Next »