Sciweavers

1757 search results - page 195 / 352
» Secure Content Validation
Sort
View
AIED
2005
Springer
15 years 5 months ago
Iterative Evaluation of a Large-Scale, Intelligent Game for Language Learning
Educational content developers, including AIED developers, traditionally make a distinction between formative evaluation and summative evaluation of learning materials. Although th...
W. Lewis Johnson, Carole R. Beal
ICFEM
2004
Springer
15 years 5 months ago
Verifying a File System Implementation
Abstract. We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed...
Konstantine Arkoudas, Karen Zee, Viktor Kuncak, Ma...
ISMIR
2004
Springer
173views Music» more  ISMIR 2004»
15 years 5 months ago
Stochastic Model of a Robust Audio Fingerprinting System
An audio fingerprint is a compact representation of the perceptually relevant parts of audio content. A suitable audio fingerprint can be used to identify audio files, even if ...
Peter Jan O. Doets, Reginald L. Lagendijk
LWA
2008
15 years 1 months ago
Labeling Clusters - Tagging Resources
In order to support the navigation in huge document collections efficiently, tagged hierarchical structures can be used. Often, multiple tags are used to describe resources. For u...
Korinna Bade, Andreas Nürnberger
MASCOTS
2007
15 years 1 months ago
PerfCenter: A Methodology and Tool for Performance Analysis of Application Hosting Centers
— We present a tool, PerfCenter, that takes as input the deployment, configuration, message flow and workload details of the hardware and software servers in an application hos...
Rukma Prabhu Verlekar, Varsha Apte, Prakhar Goyal,...