Sciweavers

313 search results - page 11 / 63
» Building Credible Input Models
Sort
View
AGILEDC
2003
IEEE
15 years 2 months ago
YP and Urban Simulation: Applying an Agile Programming Methodology in a Politically Tempestuous Domain
YP is an agile programming methodology that has evolved over the past 15 years. Many of its features are common to other agile methodologies; its novel features include using a hi...
Bjørn N. Freeman-Benson, Alan Borning
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
ISCAS
2002
IEEE
153views Hardware» more  ISCAS 2002»
15 years 2 months ago
Biological learning modeled in an adaptive floating-gate system
We have implemented an aspect of learning and memory in the nervous system using analog electronics. Using a simple synaptic circuit we realize networks with Hebbian type adaptati...
Christal Gordon, Paul E. Hasler
ACL
2009
14 years 7 months ago
Incorporating Information Status into Generation Ranking
We investigate the influence of information status (IS) on constituent order in German, and integrate our findings into a loglinear surface realisation ranking model. We show that...
Aoife Cahill, Arndt Riester
100
Voted
TOG
2012
258views Communications» more  TOG 2012»
13 years 2 days ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...