Sciweavers

1299 search results - page 231 / 260
» EMC - A modeling method for developing web-based application...
Sort
View
ISTA
2003
13 years 10 months ago
Reflective Learning in Large Companies - can it work?
: A growing number of universities and companies are now becoming focused on promoting learning that is not merely instrumental. These aspirations refer to deep learning, transform...
Mihaela-Monica Vladoiu, Beatrice Matenciuc-Antones...
CNL
2009
13 years 10 months ago
Rhetorical Compositions for Controlled Natural Languages
Logic-based controlled natural languages usually provide some facility for compositional representation, minimally including sentence level coordination and sometimes subordination...
Andrew Potter
ESORICS
2010
Springer
13 years 10 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
CEE
2010
119views more  CEE 2010»
13 years 9 months ago
Block-matching-based motion field generation utilizing directional edge displacement
A motion field generation algorithm using block matching of edge-flag histograms has been developed aiming at its application to motion recognition systems. Use of edge flags inste...
Hitoshi Hayakawa, Tadashi Shibata
SYNTHESE
2008
84views more  SYNTHESE 2008»
13 years 8 months ago
How experimental algorithmics can benefit from Mayo's extensions to Neyman-Pearson theory of testing
Although theoretical results for several algorithms in many application domains were presented during the last decades, not all algorithms can be analyzed fully theoretically. Exp...
Thomas Bartz-Beielstein