Sciweavers

9290 search results - page 1632 / 1858
» The Predictability of Data Values
Sort
View
EMSOFT
2005
Springer
15 years 10 months ago
Semantics-based optimization across uncoordinated tasks in networked embedded systems
Microservers are networked embedded devices that accept user tasks on demand and execute them on real world information collected by sensors. Sharing intermediate sensing and comp...
Jie Liu, Elaine Cheong, Feng Zhao
ESOP
2005
Springer
15 years 10 months ago
Forward Slicing by Conjunctive Partial Deduction and Argument Filtering
Program slicing is a well-known methodology that aims at identifying the program statements that (potentially) affect the values computed at some point of interest. Within imperat...
Michael Leuschel, Germán Vidal
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 10 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 10 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
ICWL
2005
Springer
15 years 10 months ago
The Research of Mining Association Rules Between Personality and Behavior of Learner Under Web-Based Learning Environment
: Discovering the relationship between behavior and personality of learner in the web-based learning environment is a key to guide learners in the learning process. This paper prop...
Jin Du, Qinghua Zheng, Haifei Li, Wenbin Yuan
« Prev « First page 1632 / 1858 Last » Next »