Sciweavers

2534 search results - page 446 / 507
» A Type System for the Push-Enter Model
Sort
View
JAPLL
2010
98views more  JAPLL 2010»
13 years 6 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton
SOCO
2010
Springer
13 years 6 months ago
Automatic detection of trends in time-stamped sequences: an evolutionary approach
This paper presents an evolutionary algorithm for modeling the arrival dates in time-stamped data sequences such as newscasts, e-mails, IRC conversations, scientific journal artic...
Lourdes Araujo, Juan Julián Merelo Guerv&oa...
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
JCST
2010
155views more  JCST 2010»
13 years 2 months ago
Efficient Location Updates for Continuous Queries over Moving Objects
Abstract The significant overhead related to frequent location updates from moving objects often results in poor performance. As most of the location updates do not affect the quer...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
PROMISE
2010
13 years 2 months ago
The role of the measure of functional complexity in effort estimation
Background. Currently there are several definitions of measures that should represent the size of software functional requirements. These measures have gained a quite relevant rol...
Luigi Lavazza, Gabriela Robiolo