Sciweavers

16206 search results - page 3121 / 3242
» At Issue
Sort
View
139
Voted
IJMSO
2007
201views more  IJMSO 2007»
15 years 1 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
163
Voted
IJNSEC
2007
253views more  IJNSEC 2007»
15 years 1 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
SYNTHESE
2008
99views more  SYNTHESE 2008»
15 years 1 months ago
Gavagai again
Quine (1960, ch.2) claims that there are a variety of equally good schemes for translating or interpreting ordinary talk. `Rabbit' might be taken to divide its reference over...
John Robert Gareth Williams
92
Voted
IJSN
2007
96views more  IJSN 2007»
15 years 1 months ago
On pairwise connectivity of wireless multihop networks
This paper experimentally investigates the service availability of wireless multihop networks based on the following two metrics: average pairwise connectivity and pairwise connec...
Fangting Sun, Mark A. Shayman
TAP
2008
Springer
93views Hardware» more  TAP 2008»
15 years 1 months ago
Pex-White Box Test Generation for .NET
Pex automatically produces a small test suite with high code coverage for a .NET program. To this end, Pex performs a systematic program analysis (using dynamic symbolic execution,...
Nikolai Tillmann, Jonathan de Halleux
« Prev « First page 3121 / 3242 Last » Next »