A Novel Method for Cross-Language Retrieval of Chunks Using Monolingual and Bilingual Corpora
暂无分享,去创建一个
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Stefano Chessa,et al. Dependable and secure data storage and retrieval in mobile, wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[3] Linlin Ci,et al. Applying Wireless Sensor Networks to Context-Awareness in Ubiquitous Learning , 2007, Third International Conference on Natural Computation (ICNC 2007).
[4] Stephen Gardner,et al. Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.
[5] Prasun Sinha,et al. On the Potential of Structure-Free Data Aggregation in Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] G. Venkataraman,et al. A Cluster-Based Approach to Fault Detection and Recovery in Wireless Sensor Networks , 2007, 2007 4th International Symposium on Wireless Communication Systems.
[7] K. K. Thyagharajan,et al. Adaptive Content Creation for Personalized e-Learning Using Web Services , 2007 .
[8] Oscar Garcia Morchon,et al. Efficient distributed security for wireless medical sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[9] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[10] Ahmet M. Kondoz,et al. Speaker adaptive vector quantisation of LPC parameters of speech , 1988 .
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[13] Bishnu S. Atal,et al. Efficient coding of LPC parameters by temporal decomposition , 1983, ICASSP.
[14] Tayebeh Mosavi Miangah. Constructing a Large-Scale English-Persian Parallel Corpus , 2009 .
[15] Jin Li,et al. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.
[16] Ivan Grech,et al. Body area network for wireless patient monitoring , 2008, IET Commun..
[17] Gregory Grefenstette,et al. Querying across languages: a dictionary-based approach to multilingual information retrieval , 1996, SIGIR '96.
[18] H. Srimathi,et al. IDENTIFICATION OF ONTOLOGY BASED LEARNING OBJECT USING INSTRUCTIONAL DESIGN , 2008 .
[19] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[20] Koun-Tem Sun,et al. The Study of Using Sure Stream to Construct Ubiquitous Learning Environment , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[21] Chien-Ding Lee,et al. A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.
[22] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[23] Bart R. Zeydel,et al. Low- and ultra low-power arithmetic units: design and comparison , 2005, 2005 International Conference on Computer Design.
[24] Vani Perumal,et al. An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations , 2009, ArXiv.
[25] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .
[26] Carla Limongelli,et al. Adaptive Learning with the LS-Plan System: A Field Evaluation , 2009, IEEE Transactions on Learning Technologies.
[27] Michael Mitzenmacher,et al. The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..
[28] F. Kareal,et al. Adaptivity in e-learning , 2006 .
[29] Y. Kawahara,et al. Building Context-Aware Applications and Probe Space Infrastructure , 2006, 2006 International Symposium on Intelligent Signal Processing and Communications.
[30] Alireza Khadivi,et al. FTPASC: A Fault Tolerant Power Aware Protocol with Static Clustering for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[31] Antonella De Angeli,et al. eLSE Methodology: a Systematic Approach to the e-Learning Systems Evaluation , 2006, J. Educ. Technol. Soc..
[32] Thambipillai Srikanthan,et al. Energy-efficient cluster-based scheme for failure management in sensor networks , 2008, IET Commun..
[33] Stephen J. H. Yang,et al. Context Aware Ubiquitous Learning Environments for Peer-to-Peer Collaborative Learning , 2006, J. Educ. Technol. Soc..