Sciweavers

6978 search results - page 1313 / 1396
» On Proofs in System P
Sort
View
ICPP
2007
IEEE
14 years 3 months ago
Analyzing and Minimizing the Impact of Opportunity Cost in QoS-aware Job Scheduling
Quality of service (QoS) mechanisms allowing users to request for turn-around time guarantees for their jobs have recently generated much interest. In our previous work we had des...
Mohammad Islam, Pavan Balaji, Gerald Sabin, P. Sad...
ICSEA
2007
IEEE
14 years 3 months ago
Test Data Generation from UML State Machine Diagrams using GAs
Automatic test data generation helps testers to validate software against user requirements more easily. Test data can be generated from many sources; for example, experience of t...
Chartchai Doungsa-ard, Keshav P. Dahal, M. Alamgir...
INFOCOM
2007
IEEE
14 years 3 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
NDSS
2007
IEEE
14 years 3 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ICCBR
2007
Springer
14 years 3 months ago
Knowledge Extraction and Summarization for an Application of Textual Case-Based Interpretation
Abstract. This paper presents KES (Knowledge Extraction and Summarization), a new knowledge-enhanced approach that builds a case memory out of episodic textual narratives. These na...
Eni Mustafaraj, Martin Hoof, Bernd Freisleben
« Prev « First page 1313 / 1396 Last » Next »