Sciweavers

253 search results - page 19 / 51
» Session Types at the Mirror
Sort
View
ACSAC
2006
IEEE
13 years 11 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini
WSC
2000
13 years 9 months ago
Integrating optimization and simulation: research and practice
The integration of optimization and simulation has become nearly ubiquitous in practice, as most discrete-event simulation packages now include some type of optimization routine. ...
Michael C. Fu, Sigrún Andradóttir, J...
DATE
2005
IEEE
118views Hardware» more  DATE 2005»
14 years 1 months ago
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems
—Presented are a methodology and a DFII-based tool for AC-stability analysis of a wide variety of closed-loop continuous-time (operational amplifiers and other linear circuits). ...
Momchil Milev, Rod Burt
CHI
2009
ACM
14 years 8 months ago
Cheese cam: unconscious interaction between humans and a digital camera
In everyday life, humans interact with many products. In many of these interactions, a person performs an action with, toward, or in the vicinity of a product and then the product...
Boram Lee, Woohun Lee
SIGIR
2011
ACM
12 years 10 months ago
Find it if you can: a game for modeling different types of web search success using interaction data
A better understanding of strategies and behavior of successful searchers is crucial for improving the experience of all searchers. However, research of search behavior has been s...
Mikhail Ageev, Qi Guo, Dmitry Lagun, Eugene Agicht...