Sciweavers

698 search results - page 12 / 140
» Evaluating Key Statements Analysis
Sort
View
SENSYS
2005
ACM
14 years 3 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
PLDI
2010
ACM
14 years 1 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
IEEECIT
2010
IEEE
13 years 7 months ago
Study on Evaluation Method of Practical Teaching: A Practical Teaching Test Analysis
The practical teaching is a key to train students in practical ability and innovative consciousness. But, evaluation standards of practice teaching are still confusion. By analyzin...
Haiwei Jin
CIKM
2010
Springer
13 years 7 months ago
Web search solved?: all result rankings the same?
The objective of this work is to derive quantitative statements about what fraction of web search queries issued to the state-of-the-art commercial search engines lead to excellen...
Hugo Zaragoza, Berkant Barla Cambazoglu, Ricardo A...
CEC
2007
IEEE
14 years 1 months ago
Theoretical derivation, analysis and empirical evaluation of a simpler Particle Swarm Optimiser
In this paper we derive a simpler form of Particle Swarm Optimiser (PSO) which still retains the key properties of the original model. We do so by progressively altering the origin...
Riccardo Poli, Dan Brattonx, Tim Blackwell, James ...