Sciweavers

1265 search results - page 190 / 253
» Computer poker: A review
Sort
View
119
Voted
JCP
2008
116views more  JCP 2008»
15 years 1 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
JSCIC
2007
85views more  JSCIC 2007»
15 years 1 months ago
On Boundary Condition Capturing for Multiphase Interfaces
This paper begins with an overview of the boundary condition capturing approach to solving problems with interfaces. Although, the authors’ original motivation was to extend the...
Jeong-Mo Hong, Tamar Shinar, Myungjoo Kang, Ronald...
WS
2008
ACM
15 years 1 months ago
Using the Semantic Web for linking and reusing data across Web 2.0 communities
Large volumes of content (bookmarks, reviews, videos, etc.) are currently being created on the "Social Web", i.e. on Web 2.0 community sites, and this content is being a...
Uldis Bojars, John G. Breslin, Aidan Finn, Stefan ...
87
Voted
TRIDENTCOM
2010
IEEE
14 years 11 months ago
Towards Maximizing Wireless Testbed Utilization Using Spectrum Slicing
As experimentation becomes one of the de-facto approaches for benchmarking, researchers are turning to testbeds to test, review and verify their work. As a result, several research...
Angelos-Christos Anadiotis, Apostolos Apostolaras,...
W4A
2010
ACM
14 years 11 months ago
The potential of adaptive interfaces as an accessibility aid for older web users
Supporting effective and enjoyable Web usage by people with sensory, motor and cognitive impairments requires more than just accessible Web content. There is an additional task of...
David Sloan, Matthew T. Atkinson, Colin H. C. Mach...