Sciweavers

1021 search results - page 154 / 205
» Pure Subtype Systems
Sort
View
TRIDENTCOM
2008
IEEE
15 years 11 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
IMSCCS
2007
IEEE
15 years 11 months ago
Control Flow Checking Algorithm using Soft-based Intra-/Inter-block Assigned-Signature
In radiation environments, alpha particles, cosmic rays and solar wind flux can cause a single event upset (SEU), which is one of the major sources of bit-flips in digital electro...
Yanxia Wu, Guochang Gu, Shaobin Huang, Jun Ni
148
Voted
IWPC
2007
IEEE
15 years 11 months ago
Empirical Evaluation of a UML Sequence Diagram with Adornments to Support Understanding of Thread Interactions
Programs that use multi-threaded concurrency are known to be difficult to design. Moreover, research in computer-science education suggests that concurrency and synchronization co...
Shaohua Xie, Eileen Kraemer, R. E. Kurt Stirewalt
VTC
2007
IEEE
110views Communications» more  VTC 2007»
15 years 11 months ago
Spatially Interpolated OFDM with Channel Estimation for Fast Fading Channels
— OFDM is well suited for data-transmission over frequency-selective channels. If the cyclic prefix is chosen sufficiently long, intersymbol interference is avoided. Thus, the ...
Peter Klenner, Karl-Dirk Kammeyer
AIED
2007
Springer
15 years 11 months ago
Does Learner Control Affect Learning?
Many intelligent tutoring systems permit some degree of learner control. A natural question is whether the increased student engagement and motivation such control provides results...
Joseph E. Beck