Sciweavers

3686 search results - page 452 / 738
» Comprehensive comprehensions
Sort
View
NORDSEC
2009
Springer
15 years 8 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
PEPM
2009
ACM
15 years 8 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
CIKM
2001
Springer
15 years 8 months ago
Exploiting A Controlled Vocabulary to Improve Collection Selection and Retrieval Effectiveness
Vocabulary incompatibilities arise when the terms used to index a document collection are largely unknown, or at least not well-known to the users who eventually search the collec...
James C. French, Allison L. Powell, Fredric C. Gey...
ECAGENTS
2001
Springer
127views ECommerce» more  ECAGENTS 2001»
15 years 8 months ago
User-Centered Agents for Structured Information Location
Abstract. This paper designs an electronic commerce system that integrates conventional electronic commerce services with contemporary WWW advantages, such as comprehensive coverag...
Xindong Wu, Daniel Ngu, Sameer Pradhan
IFIP
2001
Springer
15 years 8 months ago
Random Adjacent Sequences: An Efficient Solution for Logic BIST
: High defect coverage requires good coverage of different fault types. In this paper, we present a comprehensive test vector generation technique for BIST, called Random Single In...
René David, Patrick Girard, Christian Landr...