Sciweavers

5615 search results - page 949 / 1123
» Active Learner Modelling
Sort
View
121
Voted
CCS
2009
ACM
15 years 10 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
117
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Succession: Measuring transfer of code and developer productivity
Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect ...
Audris Mockus
107
Voted
PAKDD
2009
ACM
112views Data Mining» more  PAKDD 2009»
15 years 10 months ago
Romanization of Thai Proper Names Based on Popularity of Usages
The lack of standards for Romanization of Thai proper names makes searching activity a challenging task. This is particularly important when searching for people-related documents ...
Akegapon Tangverapong, Atiwong Suchato, Proadpran ...
139
Voted
CSE
2009
IEEE
15 years 10 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
121
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
On the Performance of Compressed Interference Forwarding for Uplink Base Station Cooperation
Abstract—The capacity of today’s cellular mobile communications systems is mainly limited by inter-cell interference. Multi-cell joint transmission or joint detection schemes a...
Michael Grieger, Patrick Marsch, Gerhard Fettweis,...