Sciweavers

35419 search results - page 198 / 7084
» How are we doing
Sort
View
CSMR
2008
IEEE
15 years 11 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu
AIED
2007
Springer
15 years 10 months ago
How did the e-learning session go? The Student Inspector
Good teachers know their students, and exploit this knowledge to adapt or optimise their instruction. Traditional teachers know their students because they interact with them face-...
Oliver Scheuer, Claus Zinn
ASIACRYPT
2007
Springer
15 years 10 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton
IUI
2006
ACM
15 years 10 months ago
How to talk to a hologram
There is a growing need for creating life-like virtual human simulations that can conduct a natural spoken dialog with a human student on a predefined subject. We present an over...
Anton Leuski, Jarrell Pair, David R. Traum, Peter ...
MSR
2006
ACM
15 years 10 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.