Sciweavers

3554 search results - page 678 / 711
» Estimating software based on use case points
Sort
View
HICSS
1997
IEEE
89views Biometrics» more  HICSS 1997»
13 years 11 months ago
Text Types in Hypermedia
The discipline of narratology has long recognized the need to classify documents as instances of different text types. We have discovered that classification is as applicable to h...
Stephen W. Smoliar, James D. Baker
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
AIML
2008
13 years 9 months ago
Valentini's cut-elimination for provability logic resolved
In 1983, Valentini presented a syntactic proof of cut-elimination for a sequent calculus GLSV for the provability logic GL where we have added the subscript V for "Valentini&q...
Rajeev Goré, Revantha Ramanayake
SYNTHESE
2008
131views more  SYNTHESE 2008»
13 years 7 months ago
A new formulation of the Principle of Indifference
This article goes to the foundations of Statistical Inference through a review of Carnap's logic theory of induction. From this point of view, it brings another solution to t...
Rodolfo de Cristofaro
INFOCOM
2008
IEEE
14 years 2 months ago
On Wireless Social Community Networks
—Wireless social community networks are emerging as a new alternative to provide wireless data access in urban areas. By relying on users in the network deployment, a wireless co...
Mohammad Hossein Manshaei, Julien Freudiger, M&aac...