Sciweavers

26354 search results - page 125 / 5271
» How we refactor, and how we know it
Sort
View
EUROGP
1999
Springer
105views Optimization» more  EUROGP 1999»
14 years 2 months ago
How to Invent Functions
The paper presents the abstraction transformation which is a fundaethod for creating functions in ADATE. The use of abstraction turns out to be similar to evolution by gene duplic...
Roland Olsson
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
14 years 2 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
ELPUB
1998
ACM
14 years 2 months ago
Research Information Take Away or How to Serve Research Information Fast and Friendly on the Web
In 1997 the library department at the University of Karlskrona/Ronneby was asked to develop a database which could be used to collate and present all the research material and ong...
Peter Linde, Leif Lagebrand
CCL
1994
Springer
14 years 2 months ago
How to Win a Game with Features
We employ the model-theoretic method of Ehrenfeucht-Fra sse Games to prove the completeness of the theory CFT, which has been introduced in 22] for describing rational trees in a ...
Rolf Backofen, Ralf Treinen
IUI
1993
ACM
14 years 2 months ago
Wizard of Oz studies: why and how
We discuss current approaches to the development of natural language dialogue systems, and claim that they do not sufficiently consider the unique qualities of man-machine intera...
Nils Dahlbäck, Arne Jönsson, Lars Ahrenb...