Sciweavers

3053 search results - page 307 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
103
Voted
WILF
2007
Springer
125views Fuzzy Logic» more  WILF 2007»
15 years 8 months ago
Computational Humour: Utilizing Cross-Reference Ambiguity for Conversational Jokes
This paper presents a computer implementation that utilizes cross-reference ambiguity in utterances for simple conversational jokes. The approach is based on the SSTH. Using a simp...
Hans Wim Tinholt, Anton Nijholt
116
Voted
FASE
2004
Springer
15 years 8 months ago
Enhancing Remote Method Invocation through Type-Based Static Analysis
Abstract. Distributed applications rely on middleware to enable interaction among remote components. Thus, the overall performance increasingly depends on the interplay between the...
Carlo Ghezzi, Vincenzo Martena, Gian Pietro Picco
145
Voted
ICDAR
2009
IEEE
15 years 12 days ago
PENTOOLS - A MATLAB Toolkit for On-line Pen-Based Data Experimentation
MATLAB provides a powerful environment for rapid prototyping of research methods and techniques. Across the wide range of on-line pen computing applications there exists a series ...
Richard M. Guest
EUROMICRO
2000
IEEE
15 years 7 months ago
A Simulink(c)-Based Approach to System Level Design and Architecture Selection
We propose a design flow for low-power and low-cost, data-dominated, embedded systems which tightly integrate different technologies and architectures. We use Mathworks’ Simuli...
Luciano Lavagno, Begoña Pino, Leonardo Mari...
114
Voted
CCS
1999
ACM
15 years 7 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel