Sciweavers

487 search results - page 51 / 98
» Do Onboarding Programs Work
Sort
View
IPPS
2003
IEEE
14 years 1 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
ICALP
2010
Springer
14 years 16 days ago
Network Design via Core Detouring for Problems without a Core
Some of the currently best-known approximation algorithms for network design are based on random sampling. One of the key steps of such algorithms is connecting a set of source nod...
Fabrizio Grandoni, Thomas Rothvoß
ICSE
1998
IEEE-ACM
13 years 12 months ago
An Adaptable Generation Approach to Agenda Management
As software engineering efforts move to more complex, distributed environments, coordinating the activities of people and tools becomes very important. While groupware systems add...
Eric K. McCall, Lori A. Clarke, Leon J. Osterweil
ICRA
1994
IEEE
124views Robotics» more  ICRA 1994»
13 years 12 months ago
Accurate Insertion Strategies Using Simple Optical Sensors
Peg-in-hole insertion is not only a longstanding problem in robotics but the most common automated mechanical assembly task [10]. In this paper we present a high precision, self-c...
Eric Paulos, John F. Canny
ICFP
2000
ACM
13 years 11 months ago
Fully reflexive intensional type analysis
Compilers for polymorphic languages can use runtime type inspection to support advanced implementation techniques such as tagless garbage collection, polymorphic marshalling, and ...
Valery Trifonov, Bratin Saha, Zhong Shao