Sciweavers

410 search results - page 74 / 82
» expert 2010
Sort
View
90
Voted
JDCTA
2010
187views more  JDCTA 2010»
14 years 5 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
JMLR
2010
103views more  JMLR 2010»
14 years 4 months ago
Regret Bounds and Minimax Policies under Partial Monitoring
This work deals with four classical prediction settings, namely full information, bandit, label efficient and bandit label efficient as well as four different notions of regret: p...
Jean-Yves Audibert, Sébastien Bubeck
PROMISE
2010
14 years 4 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...
FAST
2010
15 years 13 days ago
BASIL: Automated IO Load Balancing Across Storage Devices
Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO l...
Ajay Gulati, Chethan Kumar, Irfan Ahmad, Karan Kum...
CHI
2010
ACM
15 years 4 months ago
Physical activity motivating games: virtual rewards for real activity
Contemporary lifestyle has become increasingly sedentary: little physical (sports, exercises) and much sedentary (TV, computers) activity. The nature of sedentary activity is self...
Shlomo Berkovsky, Mac Coombe, Jill Freyne, Dipak B...