Sciweavers

29908 search results - page 5972 / 5982
» On the complexity of communication complexity
Sort
View
ESORICS
2012
Springer
11 years 10 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Performance debugging in the large via mining millions of stack traces
—Given limited resource and time before software release, development-site testing and debugging become more and more insufficient to ensure satisfactory software performance. As...
Shi Han, Yingnong Dang, Song Ge, Dongmei Zhang, Ta...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Continuous social screencasting to facilitate software tool discovery
—The wide variety of software development tools available today have a great potential to improve the way developers make software, but that potential goes unfulfilled when deve...
Emerson R. Murphy-Hill
ICSE
2012
IEEE-ACM
11 years 10 months ago
On the naturalness of software
—Natural languages like English are rich, complex, and powerful. The highly creative and graceful use of languages like English and Tamil, by masters like Shakespeare and Avvaiya...
Abram Hindle, Earl T. Barr, Zhendong Su, Mark Gabe...
MLMI
2004
Springer
14 years 1 months ago
Towards Predicting Optimal Fusion Candidates: A Case Study on Biometric Authentication Tasks
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extend in various real-life applications. ...
Norman Poh, Samy Bengio
« Prev « First page 5972 / 5982 Last » Next »