Sciweavers

842 search results - page 28 / 169
» About the authors
Sort
View
BIRTHDAY
2010
Springer
13 years 8 months ago
DKAL and Z3: A Logic Embedding Experiment
Yuri Gurevich and Itay Neeman proposed the Distributed Knowledge Authorization Language, DKAL, as an expressive, yet very succinctly expressible logic for distributed authorization...
Sergio Mera, Nikolaj Bjørner
ACL
2012
11 years 10 months ago
Applications of GPC Rules and Character Structures in Games for Learning Chinese Characters
We demonstrate applications of psycholinguistic and sublexical information for learning Chinese characters. The knowledge about the grapheme-phoneme conversion (GPC) rules of lang...
Wei-Jie Huang, Chia-Ru Chou, Yu-Lin Tzeng, Chia-Yi...
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 1 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
CHI
2009
ACM
14 years 8 months ago
Finding causes of program output with the Java Whyline
Debugging and diagnostic tools are some of the most important software development tools, but most expect developers choose the right code to inspect. Unfortunately, this rarely o...
Andrew Jensen Ko, Brad A. Myers
SIGMOD
2005
ACM
102views Database» more  SIGMOD 2005»
14 years 7 months ago
On six degrees of separation in DBLP-DB and more
An extensive bibliometric study on the db community using the collaboration network constructed from DBLP data is presented. Among many, we have found that (1) the average distanc...
Ergin Elmacioglu, Dongwon Lee