Sciweavers

12257 search results - page 2091 / 2452
» Analysis of Algorithms
Sort
View
SEKE
2009
Springer
15 years 11 months ago
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning
Code review is often suggested as a means of improving code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we developed a p...
Stefan Axelsson, Dejan Baca, Robert Feldt, Darius ...
SGAI
2009
Springer
15 years 11 months ago
Explaining How to Play Real-Time Strategy Games
Real-time strategy games share many aspects with real situations in domains such as battle planning, air traffic control, and emergency response team management which makes them a...
Ronald A. Metoyer, Simone Stumpf, Christoph Neuman...
GROUP
2009
ACM
15 years 11 months ago
Lazy scheduling of processing and transmission tasks in collaborative systems
A collaborative system must perform both processing and transmission tasks. We present a policy for scheduling these tasks on a single core that is inspired by studies of human pe...
Sasa Junuzovic, Prasun Dewan
ICUIMC
2009
ACM
15 years 11 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 11 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
« Prev « First page 2091 / 2452 Last » Next »