Sciweavers

1675 search results - page 264 / 335
» Some thoughts on teaching programming and programming langua...
Sort
View
ICALP
2005
Springer
14 years 2 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
ICALP
2005
Springer
14 years 2 months ago
Balanced Allocation and Dictionaries with Tightly Packed Constant Size Bins
We study a particular aspect of the balanced allocation paradigm (also known as the “two-choices paradigm”): constant sized bins, packed as tightly as possible. Let d ≥ 1 be...
Martin Dietzfelbinger, Christoph Weidling
ICALP
2005
Springer
14 years 2 months ago
Up-to Techniques for Weak Bisimulation
Abstract. We study the use of the elaboration preorder (due to ArunKumar and Natarajan) in the framework of up-to techniques for weak bisimulation. We show that elaboration yields ...
Damien Pous
UM
2005
Springer
14 years 2 months ago
Using Learning Curves to Mine Student Models
This paper presents an evaluation study that measures the effect of modifying feedback generality in an Intelligent Tutoring System (ITS) based on Student Models. A taxonomy of the...
Brent Martin, Antonija Mitrovic
ATAL
2004
Springer
14 years 2 months ago
Issues in Multiagent System Development
Methodologies for multiagent system development should assist the developer in making decisions about those aspects of the analysis, design and implementation, that are crucial fo...
Mehdi Dastani, Joris Hulstijn, Frank Dignum, John-...