Sciweavers

5388 search results - page 903 / 1078
» The Active Elastic Model
Sort
View
CCS
2009
ACM
15 years 11 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ICSE
2009
IEEE-ACM
15 years 11 months ago
Succession: Measuring transfer of code and developer productivity
Code ownership transfer or succession is a crucial ingredient in open source code reuse and in offshoring projects. Measuring succession can help understand factors that affect ...
Audris Mockus
PAKDD
2009
ACM
112views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Romanization of Thai Proper Names Based on Popularity of Usages
The lack of standards for Romanization of Thai proper names makes searching activity a challenging task. This is particularly important when searching for people-related documents ...
Akegapon Tangverapong, Atiwong Suchato, Proadpran ...
CSE
2009
IEEE
15 years 11 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
GLOBECOM
2009
IEEE
15 years 11 months ago
On the Performance of Compressed Interference Forwarding for Uplink Base Station Cooperation
Abstract—The capacity of today’s cellular mobile communications systems is mainly limited by inter-cell interference. Multi-cell joint transmission or joint detection schemes a...
Michael Grieger, Patrick Marsch, Gerhard Fettweis,...