Sciweavers

1153 search results - page 67 / 231
» The Complexity of Revision, Revised
Sort
View
MSR
2005
ACM
15 years 3 months ago
Mining version histories to verify the learning process of Legitimate Peripheral Participants
Since code revisions reflect the extent of human involvement in the software development process, revision histories reveal the interactions and interfaces between developers and...
Shih-Kun Huang, Kang-min Liu
JELIA
2004
Springer
15 years 3 months ago
Two Approaches to Merging Knowledge Bases
We present a framework for expressing different merging operators for belief sets. This framework is a generalisation of our earlier work concerning consistency-based belief revisi...
James P. Delgrande, Torsten Schaub
ACISP
2000
Springer
15 years 2 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
MSE
1999
IEEE
110views Hardware» more  MSE 1999»
15 years 2 months ago
Active Learning in an Electronic Design Automation Course
This paper summarizes the rationale behind revision of an electronic design automation course and the resulting learning objectives and course model. Early experiences are highlig...
Diane T. Rover, Nayda G. Santiago, Mel M. Tsai
IJCAI
2003
14 years 11 months ago
A New Look at the Semantics and Optimization Methods of CP-Networks
Preference elicitation is a serious bottleneck in many decision support applications and agent specification tasks. CP-nets were designed to make the preference elicitation proces...
Ronen I. Brafman, Yannis Dimopoulos