Sciweavers

950 search results - page 84 / 190
» presence 2008
Sort
View
ICISC
2008
126views Cryptology» more  ICISC 2008»
14 years 11 months ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
LREC
2008
104views Education» more  LREC 2008»
14 years 11 months ago
Learning Patterns for Building Resources about Semantic Relations in the Medical Domain
In this article, we present a method for extracting automatically from texts semantic relations in the medical domain using linguistic patterns. These patterns refer to three leve...
Mehdi Embarek, Olivier Ferret
LREC
2008
130views Education» more  LREC 2008»
14 years 11 months ago
DIAC+: a Professional Diacritics Recovering System
In languages that use diacritical characters, if these special signs are stripped-off from a word, the resulted string of characters may not exist in the language, and therefore i...
Dan Tufis, Alexandru Ceausu
MASCOTS
2008
14 years 11 months ago
A Novel and Generic Model for Synthesizing Disk I/O Traffic Based on The Alpha-stable Process
Obtaining representative and concise I/O workloads for the purpose of projecting the performance of storage systems remains a challenge due to the complex nature of I/O behaviors....
Qiang Zou, Dan Feng, Yifeng Zhu, Hong Jiang
NETWORKING
2008
14 years 11 months ago
On the Applicability of Knowledge Based NAT-Traversal for Home Networks
The presence of Network Address Translation (NAT) is a hindrance when accessing services within home networks, because NAT breaks the end-to-end connectivity model of the Internet ...
Andreas Müller, Andreas Klenk, Georg Carle