Sciweavers

1060 search results - page 111 / 212
» Notes on Coding Theory
Sort
View
SIGDOC
2006
ACM
15 years 3 months ago
Building bridges: connecting research ethics and computer science
The ethical conduct of research is a cornerstone of modern scientific research. Computer science and the discipline’s technological artifacts touch nearly every aspect of moder...
Thomas L. Honeycutt, David R. Wright
GECCO
2005
Springer
15 years 3 months ago
A new approach to evaluate GP schema in context
Evaluating GP schema in context is considered to be a complex, and, at times impossible, task. The tightly linked nodes of a GP tree is the main reason behind its complexity. This...
Hammad Majeed
CCS
2004
ACM
15 years 3 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
IWPC
2003
IEEE
15 years 3 months ago
Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering
A key desideratum for many software comprehension tools is to reduce the mental burdens of software engineers. That is, the tools should support cognition. This key benefit is di...
Andrew Walenstein
DEON
2010
Springer
15 years 2 months ago
Relevance, Derogation and Permission
Abstract. We show that a recently developed theory of positive permission based on the notion of derogation is hampered by a triviality result that indicates a problem with the und...
Audun Stolpe