Sciweavers

927 search results - page 136 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
GI
2010
Springer
15 years 3 months ago
Is it Possible to Interact with a Handheld Device While Holding it in Both Hands?
Abstract: Intuitiveness, attractiveness and efficiency are in general important characteristics of high quality User Interfaces (UI). In the case of a Mass Casualty Incident (MCI)...
Tayfur Coskun, Eva Artinger, Simon Nestler, Amal B...
GI
2007
Springer
15 years 10 months ago
Achieving Semantic Interoperability By Using Complex Event Processing Technology
: State-of-the-art interoperability between heterogeneous systems on a technical level builds on services oriented architectures (SOA) for a given problem space. Semantics can be i...
Margarete Donovang-Kuhlisch
CCS
2006
ACM
15 years 8 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
MOBISYS
2008
ACM
16 years 4 months ago
Brimon: a sensor network system for railway bridge monitoring
: Railway systems are critical in many regions, and can consist of several tens of thousands of bridges, being used over several decades. It is critical to have a system to monitor...
Kameswari Chebrolu, Bhaskaran Raman, Nilesh Mishra...
126
Voted
CADE
2007
Springer
16 years 4 months ago
Barendregt's Variable Convention in Rule Inductions
Abstract. Inductive definitions and rule inductions are two fundamental reasoning tools in logic and computer science. When inductive definitions involve binders, then Barendregt&#...
Christian Urban, Stefan Berghofer, Michael Norrish