Sciweavers

11740 search results - page 2294 / 2348
» More Problems in Rewriting
Sort
View
TMC
2008
91views more  TMC 2008»
13 years 8 months ago
Efficient and Resilient Backbones for Multihop Wireless Networks
We consider the problem of finding "backbones" in multihop wireless networks. The backbone provides end-toend connectivity, allowing non-backbone nodes to save energy sin...
Seungjoon Lee, Bobby Bhattacharjee, Aravind Sriniv...
JCP
2007
110views more  JCP 2007»
13 years 8 months ago
The Effects of a Web-based Guided Inquiry Approach on Students' Achievement
- Although Web technology is widely used in today’s classrooms, educationists are still unsure of its capability to generate meaningful learning. As the numbers of web-based lear...
Irfan Naufal Umar, Sajap Maswan
JITECH
2007
220views more  JITECH 2007»
13 years 8 months ago
Fixing the payment system at Alvalade XXI: a case on IT project risk management
This case describes the implementation and subsequent failure of an innovative system installed in the bars of Alvalade XXI, the recently built football stadium in Lisbon, Portuga...
Ramon O'Callaghan
TSE
2008
148views more  TSE 2008»
13 years 8 months ago
Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings
Software defect prediction strives to improve software quality and testing efficiency by constructing predictive classification models from code attributes to enable a timely ident...
Stefan Lessmann, Bart Baesens, Christophe Mues, Sw...
JOC
2007
133views more  JOC 2007»
13 years 8 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
« Prev « First page 2294 / 2348 Last » Next »