Sciweavers

1573 search results - page 272 / 315
» Strong User Authentication
Sort
View
SAS
2005
Springer
118views Formal Methods» more  SAS 2005»
15 years 3 months ago
Inference of Well-Typings for Logic Programs with Application to Termination Analysis
A method is developed to infer a polymorphic well-typing for a logic program. Our motivation is to improve the automation of termination analysis by deriving types from which norms...
Maurice Bruynooghe, John P. Gallagher, Wouter Van ...
ACII
2005
Springer
15 years 3 months ago
Pronunciation Learning and Foreign Accent Reduction by an Audiovisual Feedback System
Abstract. Global integration and migration force people to learn additional languages. With respect to major languages, the acquisition is already initiated at primary school but a...
Oliver Jokisch, Uwe Koloska, Diane Hirschfeld, R&u...
ACMSE
2004
ACM
15 years 3 months ago
Trustworthiness in e-commerce
Usability has often been sold as the silver bullet for solving the problems of unprofitable online stores. Although better usability will generally improve these sites and their p...
Patricia Lanford, Roland Hübscher
MOBICOM
2004
ACM
15 years 3 months ago
Characterizing flows in large wireless data networks
Several studies have recently been performed on wireless university campus networks, corporate and public networks. Yet little is known about the flow-level characterization in s...
Xiaoqiao Meng, Starsky H. Y. Wong, Yuan Yuan, Song...
WDAG
2004
Springer
98views Algorithms» more  WDAG 2004»
15 years 3 months ago
Dynamic Memory ABP Work-Stealing
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (hencheforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of ch...
Danny Hendler, Yossi Lev, Nir Shavit