Sciweavers

1021 search results - page 154 / 205
» Pure Subtype Systems
Sort
View
TRIDENTCOM
2008
IEEE
14 years 2 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
IMSCCS
2007
IEEE
14 years 2 months ago
Control Flow Checking Algorithm using Soft-based Intra-/Inter-block Assigned-Signature
In radiation environments, alpha particles, cosmic rays and solar wind flux can cause a single event upset (SEU), which is one of the major sources of bit-flips in digital electro...
Yanxia Wu, Guochang Gu, Shaobin Huang, Jun Ni
IWPC
2007
IEEE
14 years 2 months ago
Empirical Evaluation of a UML Sequence Diagram with Adornments to Support Understanding of Thread Interactions
Programs that use multi-threaded concurrency are known to be difficult to design. Moreover, research in computer-science education suggests that concurrency and synchronization co...
Shaohua Xie, Eileen Kraemer, R. E. Kurt Stirewalt
VTC
2007
IEEE
110views Communications» more  VTC 2007»
14 years 2 months ago
Spatially Interpolated OFDM with Channel Estimation for Fast Fading Channels
— OFDM is well suited for data-transmission over frequency-selective channels. If the cyclic prefix is chosen sufficiently long, intersymbol interference is avoided. Thus, the ...
Peter Klenner, Karl-Dirk Kammeyer
AIED
2007
Springer
14 years 2 months ago
Does Learner Control Affect Learning?
Many intelligent tutoring systems permit some degree of learner control. A natural question is whether the increased student engagement and motivation such control provides results...
Joseph E. Beck