Sciweavers

503 search results - page 94 / 101
» If not now, when
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
KI
2008
Springer
13 years 9 months ago
Can Argumentation Help AI to Understand Explanation?
ed from context by seeing an explanation inferentially, much in the same way that early expert systems saw an explanation as chaining of inferences. This approach omitted, for the ...
Doug Walton
NETWORK
2006
218views more  NETWORK 2006»
13 years 9 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
INFSOF
2007
116views more  INFSOF 2007»
13 years 9 months ago
An analysis of the most cited articles in software engineering journals - 2000
Citations and related work are crucial in any research to position the work and to build on the work of others. A high citation count is an indication of the influence of speciï¬...
Claes Wohlin
TIP
2008
144views more  TIP 2008»
13 years 9 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras