Sciweavers

248 search results - page 23 / 50
» Test exploration and validation using transaction level mode...
Sort
View
ITS
2004
Springer
72views Multimedia» more  ITS 2004»
14 years 1 months ago
Using Knowledge Tracing to Measure Student Reading Proficiencies
Constructing a student model for language tutors is a challenging task. This paper describes using knowledge tracing to construct a student model of reading proficiency and validat...
Joseph E. Beck, June Sison
IACR
2011
121views more  IACR 2011»
12 years 8 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref
UML
2005
Springer
14 years 1 months ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
ICCAD
2002
IEEE
103views Hardware» more  ICCAD 2002»
14 years 5 months ago
A realistic variable voltage scheduling model for real-time applications
Voltage scheduling is indispensable for exploiting the benefit of variable voltage processors. Though extensive research has been done in this area, current processor limitations...
Bren Mochocki, Xiaobo Sharon Hu, Gang Quan
CAISE
2006
Springer
14 years 6 days ago
Modelling and Verifying of e-Commerce Systems
Static function hierarchies and models of the dynamic behaviour are typically used in e-commerce systems. Issues to be verifies are the completeness and correctness of the static f...
Andreas Speck