Computer Science (Scholarly Publications): Recent submissions
Now showing items 581-600 of 1420
-
Disfluency in Multiparty Social Talk
(2015) -
Open access wireless markets
(2016)This paper describes an open access market for capacity. Open access means that in real-time, network capacity cannot be withheld—capacity is priced dynamically by the marginal demand during congestion. The paper offers ... -
Detection of Verbal Multi-Word Expressions via Conditional Random Fields with Syntactic Dependency Features and Semantic Re-Ranking
(Association for Computational Linguistics, 2017)A description of a system for identifying Verbal Multi-Word Expressions (VMWEs) in running text is presented. The system mainly exploits universal syntactic dependency features through a Conditional Random Fields (CRF) ... -
Challenges for Value-Driven Semantic Data Quality Management
(SCITEPRESS, 2017) -
VGDD: A virtual grid based data dissemination scheme for wireless sensor networks with mobile sink
(2015)Wireless sensor network (WSN) is considered as the enabling technology to bridge the gap between the physical and digital world. Some of the applications environments of WSN require a mobile sink to operate in the sensor ... -
Qos-aware error recovery in wireless body sensor networks using adaptive network coding
(2015)Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate ... -
State of the art survey on security issue in cloud computing architectures, approaches and methods
(2015)The development of cloud computing has revolutioniz ed in how the computing and storage are utilized remotely. It has grown from being hopeful business concept to one of the fast growing segments of the IT ... -
A comprehensive review on privacy preserving data mining
(2015)Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publish- ing. Ever-escalating internet phishing posed ... -
Why XLIFF and Why XLIFF 2?
(Editions Tradulex, Geneva, 2016) -
Best Practice for DSDL-based Validation
(XML London, 2016) -
What we talk about when we talk about interactivity: Empowerment in public discourse
(2017)This study offers new insights into interactivity by examining its association with empowerment in public discourse. Using data from 20 years of newspaper coverage, a mixed methods analysis ... -
Between the Event Calculus and Finite State Temporality
(Springer, 2016) -
Clonal Plasticity: A Method for Decentralized Adaptation in Multi-agent Systems
(2016)This paper introduces a new plant-inspired mechanism for decentralized adaptation, called clonal plasticity, which does not make use of the MAPE loop. The mechanism acts on every individual in a population and does not ... -
UTPCalc - A calculator for UTP Predicates
(Springer International Publishing, 2017) -
WaterCom: Connecting research configurations with practical deployments: A multilevel, multipurpose underwater communications test platform
(ACM, 2016)This paper describes the ongoing evolution of the Water-Com framework developed as part of the NSF funded Ocean-TUNE CRI project. A particular challenge for connecting global researchers and the public with remote, autonomous ...