Sciweavers

2066 search results - page 105 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
BIS
2009
146views Business» more  BIS 2009»
14 years 7 months ago
Computer Support for Agile Human-to-Human Interactions with Social Protocols
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility,...
Willy Picard
CPM
2007
Springer
222views Combinatorics» more  CPM 2007»
15 years 4 months ago
Computing Exact p-Value for Structured Motif
Extracting motifs from a set of DNA sequences is important in computational biology. Occurrence probability is a common used statistics to evaluate the statistical significance of...
Jing Zhang, Xi Chen, Ming Li
ISW
2007
Springer
15 years 4 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
DCC
2011
IEEE
14 years 4 months ago
Improving PPM Algorithm Using Dictionaries
—We propose a method to improve traditional character-based PPM text compression algorithms. Consider a text file as a sequence of alternating words and non-words, the basic ide...
Yichuan Hu, Jianzhong (Charlie) Zhang, Farooq Khan...
IJAR
2010
120views more  IJAR 2010»
14 years 8 months ago
Comparison of tightly and loosely coupled decision paradigms in multiagent expedition
Frameworks for cooperative multiagent decision making may be divided into those where each agent is assigned a single variable (SVFs) and those where each agent carries an interna...
Yang Xiang, Franklin Hanshar