Sciweavers

14078 search results - page 2701 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
SOUPS
2010
ACM
15 years 7 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
CAV
2006
Springer
95views Hardware» more  CAV 2006»
15 years 7 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 6 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
CASES
2008
ACM
15 years 5 months ago
Cache-aware cross-profiling for java processors
Performance evaluation of embedded software is essential in an early development phase so as to ensure that the software will run on the embedded device's limited computing r...
Walter Binder, Alex Villazón, Martin Schoeb...
ACL
2001
15 years 4 months ago
Non-Verbal Cues for Discourse Structure
This paper addresses the issue of designing embodied conversational agents that exhibit appropriate posture shifts during dialogues with human users. Previous research has noted t...
Justine Cassell, Yukiko I. Nakano, Timothy W. Bick...
« Prev « First page 2701 / 2816 Last » Next »