Sciweavers

410 search results - page 81 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
JUCS
2010
186views more  JUCS 2010»
13 years 4 months ago
Context Awareness for Collaborative Learning with Uncertainty Management
: In Collaborative Learning, groups of students work together using traditional and computer-based tools or applications. Participants are continuously moving and reorganizing in g...
Roc Messeguer, Leandro Navarro, Pedro Damiá...
PROCEDIA
2010
344views more  PROCEDIA 2010»
13 years 4 months ago
Towards high-quality, untangled meshes via a force-directed graph embedding approach
High quality meshes are crucial for the solution of partial differential equations (PDEs) via the finite element method (or other PDE solvers). The accuracy of the PDE solution,...
Sanjukta Bhowmick, Suzanne M. Shontz
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 7 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
OOPSLA
2004
Springer
13 years 11 months ago
Practical predicate dispatch
Predicate dispatch is an object-oriented (OO) language mechanism for determining the method implementation to be invoked upon a message send. With predicate dispatch, each method ...
Todd D. Millstein
ASIACRYPT
2003
Springer
13 years 11 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...