Sciweavers

1060 search results - page 180 / 212
» Notes on Coding Theory
Sort
View
75
Voted
ATAL
2003
Springer
15 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
78
Voted
ATAL
2008
Springer
14 years 11 months ago
A heads-up no-limit Texas Hold'em poker player: discretized betting models and automatically generated equilibrium-finding progr
We present Tartanian, a game theory-based player for headsup no-limit Texas Hold'em poker. Tartanian is built from three components. First, to deal with the virtually infinit...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
108
Voted
EDCC
2008
Springer
14 years 11 months ago
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager
In avionics domain, the software applications grew to millions of source lines of code representing important development expenditures. To cut the costs, the avionics suppliers ar...
Stéphanie Gaudan, Gilles Motet, Guillaume A...
BCSHCI
2008
14 years 11 months ago
Low cost prototyping: part 1, or how to produce better ideas faster by getting user reactions early and often
Although approaches to User Centered Software Development have existed for almost 20 years a rift still exists between theory and practice. In practice, many software projects are...
Stephen Brown, Andreas Holzinger
MOBIMEDIA
2007
14 years 11 months ago
Unequal error protection based on objective video evaluation model
Usually unequal error protection schemes mostly focus on protecting video data parameters with unequal rates or levels depending on their sensitivities to errors. This paper first...
Wen Ji, Yiqiang Chen, Min Chen, Yi Kang