Sciweavers

1363 search results - page 191 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
RE
2006
Springer
14 years 11 months ago
Identifying Nocuous Ambiguities in Natural Language Requirements
We present a novel technique that automatically alerts authors of requirements to the presence of potentially dangerous ambiguities. We first establish the notion of nocuous ambig...
Francis Chantree, Bashar Nuseibeh, Anne N. De Roec...
IJEB
2007
127views more  IJEB 2007»
14 years 11 months ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
IJNSEC
2007
111views more  IJNSEC 2007»
14 years 11 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
IJVR
2007
85views more  IJVR 2007»
14 years 11 months ago
Detection of Landmarks for Clustering of Online-Game Players
—Understanding of player behaviors is an important issue to keep online games interesting to their players. Focusing on player movement, in our previous work, we proposed a metho...
Ruck Thawonmas, Masayoshi Kurashige, Kuan-Ta Chen
65
Voted
TIT
2008
86views more  TIT 2008»
14 years 11 months ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski