Sciweavers

1737 search results - page 183 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
126
Voted
COLING
1994
15 years 6 months ago
A "not-so-shallow" parser for collocational analysis
Collocational analysis is the basis of many studies on lexical acquisition. Collocations are extracted from corpora using more or less shallow processing techniques, that span from...
Roberto Basili, Maria Teresa Pazienza, Paola Velar...
EWC
2011
112views more  EWC 2011»
14 years 8 months ago
CAD-integrated analysis of 3-D beams: a surface-integration approach
1 Most engineering artifacts are designed and analyzed2 today within a 3-D computer aided design (CAD)3 environment. However, slender objects such as beams are4 designed in a 3-D e...
Wa'el Abdel Samad, Krishnan Suresh
156
Voted
AGENTS
2001
Springer
15 years 9 months ago
An auction-based method for decentralized train scheduling
We present a computational study of an auction-based method for decentralized train scheduling. The method is well suited to the natural information and control structure of moder...
David C. Parkes, Lyle H. Ungar
ISI
2006
Springer
15 years 5 months ago
On the Topology of the Dark Web of Terrorist Groups
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...
CIKM
2009
Springer
15 years 11 months ago
A mobile tourist assistance and recommendation system based on complex networks
In recent years, the tourism assistance community is gradually shifting its emphasis to digital, interactive systems. Our project aims for digital tourism assistance by combining ...
Alf-Christian Schering, Martin Dueffer, Andreas Fi...