Sciweavers

708 search results - page 35 / 142
» Computational Law
Sort
View
AUSFORENSICS
2003
15 years 1 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
SAGT
2009
Springer
192views Game Theory» more  SAGT 2009»
15 years 6 months ago
Learning and Approximating the Optimal Strategy to Commit To
Computing optimal Stackelberg strategies in general two-player Bayesian games (not to be confused with Stackelberg strategies in routing games) is a topic that has recently been ga...
Joshua Letchford, Vincent Conitzer, Kamesh Munagal...
IPPS
2003
IEEE
15 years 5 months ago
Towards a Theory of Bisimulation for a Fragment of Verilog
In this paper, we have developed an operational semantic framework for a non-trival subset of Verilog which features event–driven computation, shared variable concurrency. The b...
Li Yongjian, Jifeng He
SIGDOC
2003
ACM
15 years 5 months ago
Liability for defective documentation
Several companies are careless about the accuracy of their user manuals and online help, leading readers to believe that a product has characteristics that it lacks. Under America...
Cem Kaner
CHI
2005
ACM
16 years 6 days ago
A simple movement time model for scrolling
A model for movement time for scrolling is developed and verified experimentally. It is hypothesized that the maximum scroll speed is a constant at which the target can be perceiv...
Tue Haste Andersen