Sciweavers

1557 search results - page 147 / 312
» Programming up to Congruence
Sort
View
ISCC
2007
IEEE
15 years 5 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø
AIED
2007
Springer
15 years 5 months ago
Tools for Authoring a Dialogue Agent that Participates in Learning Studies
TuTalk supports the rapid development of dialogue agents for learning applications. It enables an experimenter to create a dialogue agent with either minimal or no programming and ...
Pamela W. Jordan, Brian Hall, Michael A. Ringenber...
CP
2007
Springer
15 years 5 months ago
Solution Counting Algorithms for Constraint-Centered Search Heuristics
Constraints have played a central role in cp because they capture key substructures of a problem and efficiently exploit them to boost inference. This paper intends to do the same ...
Alessandro Zanarini, Gilles Pesant
ERCIMDL
2007
Springer
110views Education» more  ERCIMDL 2007»
15 years 5 months ago
Annotation-Based Document Retrieval with Probabilistic Logics
Annotations are an important part in today’s digital libraries and Web information systems as an instrument for interactive knowledge creation. Annotation-based document retrieva...
Ingo Frommholz
EUROPAR
2007
Springer
15 years 5 months ago
Starvation-Free Transactional Memory-System Protocols
Abstract. Transactional memory systems trade ease of programming with runtime performance losses in handling transactions. This paper focuses on starvation effects that show up in ...
M. M. Waliullah, Per Stenström