Sciweavers

2089 search results - page 335 / 418
» Simulation Based Construction Management Learning System
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
15 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
COMPSAC
2008
IEEE
14 years 11 months ago
Decision Support for User Interface Design: Usability Diagnosis by Time Analysis of the User Activity
This paper presents a methodology for setting up a Decision Support system for User Interface Design (DSUID). We first motivate the role and contributions of DSUID and then demons...
Avi Harel, Ron S. Kenett, Fabrizio Ruggeri
SIGSOFT
2009
ACM
15 years 10 months ago
SCA: a semantic conflict analyzer for parallel changes
Parallel changes are becoming increasingly prevalent in the development of large scale software system. To further study the relationship between parallel changes and faults, we h...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
IJCAI
2007
14 years 11 months ago
A Fully Connectionist Model Generator for Covered First-Order Logic Programs
We present a fully connectionist system for the learning of first-order logic programs and the generation of corresponding models: Given a program and a set of training examples,...
Sebastian Bader, Pascal Hitzler, Steffen Höll...
SASN
2003
ACM
15 years 3 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi