Sciweavers

2488 search results - page 451 / 498
» An improvement in formal verification
Sort
View
CANDC
2007
ACM
15 years 3 months ago
A computational model of the music of Stevie Ray Vaughan
Every musician who improvises has a unique musical vocabulary, which may be perceived in his or her compositions. In this paper, we explain our design of a computational model tha...
Naresh Vempala, Subrata Dasgupta
CONEXT
2008
ACM
15 years 3 months ago
Maintaining replicas in unstructured P2P systems
Replication is widely used in unstructured peer-to-peer systems to improve search or achieve availability. We identify and solve a subclass of replication problems where each obje...
Christof Leng, Wesley W. Terpstra, Bettina Kemme, ...
DEXA
2008
Springer
151views Database» more  DEXA 2008»
15 years 3 months ago
Extraction of Opposite Sentiments in Classified Free Format Text Reviews
Opinion mining received well attention in finding personal opinions from user generated content. These opinions contain valuable information for improving and/or comparing the prod...
Dong (Haoyuan) Li, Anne Laurent, Mathieu Roche, Pa...
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 3 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
IESA
2007
15 years 2 months ago
Application Development with Virtual Teams: Models and Metrics
Increased performance is the key reason for developing software with virtual teams but the research efforts to date are limited. Difficulties for a formal, generic approach are mul...
D. Radoiu