Sciweavers

234 search results - page 18 / 47
» May We Have Your Attention: Analysis of a Selective Attentio...
Sort
View
ICSOC
2009
Springer
13 years 5 months ago
EC2 Performance Analysis for Resource Provisioning of Service-Oriented Applications
Abstract. Cloud computing is receiving increasingly attention as it provides infinite resource capacity and "pay-as-you-go" resource usage pattern to hosted applications....
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
VIZSEC
2004
Springer
14 years 26 days ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
CHI
1994
ACM
13 years 11 months ago
Using aggregation and dynamic queries for exploring large data sets
When working with large data sets, users perform three primary types of activities: data manipulation, data analysis, and data visualization. The data manipulation process involve...
Jade Goldstein, Steven F. Roth
AIED
2007
Springer
14 years 1 months ago
Profiling Student Interactions in Threaded Discussions with Speech Act Classifiers
On-line discussion is a popular form of web-based computer-mediated communication and is an important medium for distance education. Automatic tools for analyzing online discussion...
Sujith Ravi, Jihie Kim