Sciweavers

4762 search results - page 627 / 953
» About the use of protein models
Sort
View
SIGSOFT
2007
ACM
16 years 2 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
15 years 8 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
ATAL
2009
Springer
15 years 8 months ago
Perspectives and challenges of agent-based simulation as a tool for economics and other social sciences
This paper argues that the agent-based simulation approach is just the one appropriate to the social sciences (including economics). Although there were many predecessor approache...
Klaus G. Troitzsch
VSTTE
2005
Springer
15 years 7 months ago
It Is Time to Mechanize Programming Language Metatheory
How close are we to a world in which mechanically verified software is commonplace? A world in which theorem proving technology is used routinely by both software developers and p...
Benjamin C. Pierce, Peter Sewell, Stephanie Weiric...
CSCW
2012
ACM
13 years 9 months ago
Blogs as a collective war diary
Disaster-related research in human-centered computing has typically focused on the shorter-term, emergency period of a disaster event, whereas effects of some crises are longterm,...
Gloria Mark, Mossaab Bagdouri, Leysia Palen, James...