Sciweavers

1385 search results - page 248 / 277
» Palm Game Design
Sort
View
ACMSE
2007
ACM
13 years 11 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
SIGIR
2010
ACM
13 years 11 months ago
Exploring the use of labels to shortcut search trails
Search trails comprising queries and Web page views are created as searchers engage in information-seeking activity online. During known-item search (where the objective may be to...
Ryen W. White, Raman Chandrasekar
ATAL
2006
Springer
13 years 11 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss
CCS
2006
ACM
13 years 11 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
COMSWARE
2006
IEEE
13 years 11 months ago
M2MC: Middleware for many to many communication over broadcast networks
M2MC is a new distributed computing middleware designed to support collaborative applications running on devices connected by broadcast networks. Examples of such networks are wire...
Chaitanya Krishna Bhavanasi, Sridhar Iyer