Sciweavers

15781 search results - page 3111 / 3157
» Evaluating Information Extraction
Sort
View
HUC
2010
Springer
13 years 10 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
GECCO
2008
Springer
132views Optimization» more  GECCO 2008»
13 years 10 months ago
Hybridizing an evolutionary algorithm with mathematical programming techniques for multi-objective optimization
In recent years, the development of multi-objective evolutionary algorithms (MOEAs) hybridized with mathematical programming techniques has significantly increased. However, most...
Saúl Zapotecas Martínez, Carlos A. C...
ICFP
2010
ACM
13 years 10 months ago
Logical types for untyped languages
Programmers reason about their programs using a wide variety of formal and informal methods. Programmers in untyped languages such as Scheme or Erlang are able to use any such met...
Sam Tobin-Hochstadt, Matthias Felleisen
ACMDIS
2010
ACM
13 years 9 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton
MOBICOM
2010
ACM
13 years 9 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
« Prev « First page 3111 / 3157 Last » Next »