Sciweavers

35419 search results - page 242 / 7084
» How are we doing
Sort
View
JLP
2007
98views more  JLP 2007»
15 years 4 months ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
CN
2000
137views more  CN 2000»
15 years 4 months ago
How dynamic is the Web?
Recent experiments and analysis suggest that there are about 800 million publicly-indexable Web pages. However, unlike books in a traditional library, Web pages continue to change...
Brian E. Brewington, George Cybenko
ETS
2002
IEEE
100views Hardware» more  ETS 2002»
15 years 4 months ago
How to Annotate Educational Multimedia with Non-Functional Requirements
We develop a scheme for representing critical non-functional requirements (NFRs), and apply it to the domain of multimedia educational software (MES) to validate it. Our approach ...
Giovanna Avellis, Anthony Finkelstein
SIGDIAL
2010
15 years 2 months ago
How was your day? An architecture for multimodal ECA systems
Multimodal conversational dialogue systems consisting of numerous software components create challenges for the underlying software architecture and development practices. Typical...
Raul Santos de la Camara, Markku Turunen, Jaakko H...
WAOA
2010
Springer
251views Algorithms» more  WAOA 2010»
15 years 2 months ago
How to Play Unique Games on Expanders
In this paper, we improve a result by Arora, Khot, Kolla, Steurer, Tulsiani, and Vishnoi on solving the Unique Games problem on expanders. Given a (1-)-satisfiable instance of Uniq...
Konstantin Makarychev, Yury Makarychev