Sciweavers

5089 search results - page 123 / 1018
» Attention
Sort
View
ECSQARU
2003
Springer
15 years 9 months ago
Web of Trust: Applying Probabilistic Argumentation to Public-Key Cryptography
1 The purpose of this paper is to show how probabilistic argumentation is applicable to modern public-key cryptography as an appropriate tool to evaluate webs of trust. This is an ...
Rolf Haenni
132
Voted
ECSQARU
2003
Springer
15 years 9 months ago
Applications of Latent Class Analysis in Social Science Research
An overview is provided of recent developments in the use of latent class (LC) models in social science research. Special attention is paid to the application of LC analysis as a f...
Jeroen K. Vermunt
122
Voted
EGOV
2003
Springer
15 years 9 months ago
Internet NGOs: Legitimacy and Accountability
As the power and influence of nongovernmental organizations (NGOs) in international debates on social and moral matters increases, questions concerning their legitimacy and account...
Anton Vedder
124
Voted
MSR
2010
ACM
15 years 9 months ago
THEX: Mining metapatterns from java
—Design patterns are codified solutions to common object-oriented design (OOD) problems in software development. One of the proclaimed benefits of the use of design patterns is...
Daryl Posnett, Christian Bird, Premkumar T. Devanb...
130
Voted
ICMCS
2000
IEEE
206views Multimedia» more  ICMCS 2000»
15 years 9 months ago
Audio Watermarking: Features, Applications, and Algorithms
This paper considers desired properties and possible applications of audio watermarking algorithms. Special attention is given to statistical methods working in the fourier domain...
Michael Arnold