Sciweavers

2827 search results - page 538 / 566
» CCured in the real world
Sort
View
COCOON
2010
Springer
14 years 3 months ago
Clustering with or without the Approximation
We study algorithms for clustering data that were recently proposed by Balcan, Blum and Gupta in SODA’09 [4] and that have already given rise to two follow-up papers. The input f...
Frans Schalekamp, Michael Yu, Anke van Zuylen
ITS
2010
Springer
178views Multimedia» more  ITS 2010»
14 years 3 months ago
Learning What Works in ITS from Non-traditional Randomized Controlled Trial Data
The traditional, well established approach to finding out what works in education research is to run a randomized controlled trial (RCT) using a standard pretest and posttest desig...
Zachary A. Pardos, Matthew D. Dailey, Neil T. Heff...
NOSSDAV
2010
Springer
14 years 3 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
BTW
2009
Springer
132views Database» more  BTW 2009»
14 years 3 months ago
A Bayesian Approach to Estimating the Selectivity of Conjunctive Predicates
: Cost-based optimizers in relational databases make use of data statistics to estimate intermediate result cardinalities. Those cardinalities are needed to estimate access plan co...
M. Heimel, Volker Markl, Keshava Murthy
DESRIST
2009
Springer
110views Education» more  DESRIST 2009»
14 years 3 months ago
Towards a paradigmatic shift in IS: designing for social practice
The paper elaborates on the theoretical foundation of Information System understood as a field of design science. Revisiting Hevner’s et al. seminal paper [44], we elaborate on ...
Markus Rohde, Gunnar Stevens, Peter Brödner, ...