Sciweavers

771 search results - page 142 / 155
» EasyCheck - Test Data for Free
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 10 months ago
Calculating modules in contextual logic program refinement
The refinement calculus for logic programs is a framework for deriving logic programs from specifications. It is based on a wide-spectrum language that can express both specificat...
Robert Colvin, Ian J. Hayes, Paul A. Strooper
CSDA
2006
98views more  CSDA 2006»
13 years 10 months ago
Fast estimation algorithm for likelihood-based analysis of repeated categorical responses
Likelihood-based marginal regression modelling for repeated, or otherwise clustered, categorical responses is computationally demanding. This is because the number of measures nee...
Jukka Jokinen
IJMMS
2008
131views more  IJMMS 2008»
13 years 10 months ago
Avatars in social media: Balancing accuracy, playfulness and embodied messages
This paper examines how users negotiate their self-presentation via an avatar used in social media. Twenty participants customised an avatar while thinking aloud. An analysis of t...
Asimina Vasalou, Adam N. Joinson, Tanja Bänzi...
IPL
2008
95views more  IPL 2008»
13 years 10 months ago
Optimal point removal in closed-2PM labeling
An optimal labeling where labels are disjoint axis-parallel equal-size squares is called 2PM labeling if the labels have maximum length each attached to its corresponding point on...
Farshad Rostamabadi, Iman Sadeghi, Mohammad Ghodsi...
IJISEC
2006
113views more  IJISEC 2006»
13 years 10 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...