Sciweavers

1265 search results - page 63 / 253
» Computer poker: A review
Sort
View
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 4 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
PERVASIVE
2005
Springer
15 years 3 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
IFIP3
2004
99views Education» more  IFIP3 2004»
14 years 11 months ago
Eight significant events in the 50 year history of computing
: The history of computing is relatively short compared with that of any other area of human knowledge, be it science, engineering, medicine, law, or accounting. On the other hand,...
T. William Olle
HPDC
2010
IEEE
14 years 10 months ago
A perspective on scientific cloud computing
Cloud computing has the potential for tremendous benefits, but wide scale adoption has a range of challenges that must be met. We review these challenges and how they relate to sc...
Craig A. Lee
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 10 months ago
Algorithmic Detection of Computer Generated Text
ct Computer generated academic papers have been used to expose a lack of thorough human review at several computer science conferences. We assess the problem of classifying such do...
Allen Lavoie, Mukkai Krishnamoorthy