Sciweavers

1518 search results - page 186 / 304
» Cryptographic Test Correction
Sort
View
99
Voted
FM
2008
Springer
77views Formal Methods» more  FM 2008»
15 years 2 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
SDM
2010
SIAM
191views Data Mining» more  SDM 2010»
15 years 2 months ago
Active Ordering of Interactive Prediction Tasks
Many applications involve a set of prediction tasks that must be accomplished sequentially through user interaction. If the tasks are interdependent, the order in which they are p...
Abhimanyu Lad, Yiming Yang
94
Voted
SERVICES
2010
123views more  SERVICES 2010»
15 years 2 months ago
Testbeds for Emulating Dependability Issues of Mobile Web Services
Today's ubiquitous internet access has opened new opportunities for mobile workers. By using portable devices, the workers are not only able to access their company's dat...
Lukasz Juszczyk, Schahram Dustdar
101
Voted
IADIS
2008
15 years 2 months ago
Ajax-Based E-Learning System
An e-learning system based on Ajax has been developed. Ajax enables Web users to upload user commands and download new information without the need for a page refresh. Various e-l...
Mami Tanimoto, Yoshiaki Shikata
95
Voted
IPCV
2008
15 years 2 months ago
Speech Recognition System of Arabic Digits based on A Telephony Arabic Corpus
- Automatic recognition of spoken digits is one of the difficult tasks in the field of computer speech recognition. Spoken digits recognition process is required in many applicatio...
Yousef Alotaibi, Mansour Al-Ghamdi, Fahad Alotaiby