Sciweavers

26354 search results - page 5131 / 5271
» How we refactor, and how we know it
Sort
View
CGF
2010
121views more  CGF 2010»
15 years 1 months ago
GraphDice: A System for Exploring Multivariate Social Networks
Social networks collected by historians or sociologists typically have a large number of actors and edge attributes. Applying social network analysis (SNA) algorithms to these net...
Anastasia Bezerianos, Fanny Chevalier, Pierre Drag...
CGF
2010
161views more  CGF 2010»
15 years 1 months ago
HyperMoVal: Interactive Visual Validation of Regression Models for Real-Time Simulation
During the development of car engines, regression models that are based on machine learning techniques are increasingly important for tasks which require a prediction of results i...
Harald Piringer, Wolfgang Berger, J. Krasser
144
Voted
COMCOM
2008
147views more  COMCOM 2008»
15 years 1 months ago
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infra...
Azzedine Boukerche, Horacio A. B. F. de Oliveira, ...
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 1 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
125
Voted
EJIS
2010
112views more  EJIS 2010»
15 years 1 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé
« Prev « First page 5131 / 5271 Last » Next »