Sciweavers

3108 search results - page 3 / 622
» The Elements of Computer Credibility
Sort
View
DAC
2001
ACM
14 years 8 months ago
Watermarking of SAT using Combinatorial Isolation Lemmas
Watermarking of hardware and software designs is an effective mechanism for intellectual property protection (IPP). Two important criteria for watermarking schemes are credibility...
Rupak Majumdar, Jennifer L. Wong
JUCS
2007
109views more  JUCS 2007»
13 years 7 months ago
On Ranking RDF Schema Elements (and its Application in Visualization)
Abstract: Ranking is a ubiquitous requirement whenever we confront a large collection of atomic or interrelated artifacts. This paper elaborates on this issue for the case of RDF s...
Yannis Tzitzikas, Dimitris Kotzinos, Yannis Theoha...
ACL
2009
13 years 5 months ago
WISDOM: A Web Information Credibility Analysis Systematic
Susumu Akamine, Daisuke Kawahara, Yoshikiyo Kato, ...
WIMOB
2008
IEEE
14 years 1 months ago
Enhancing the Credibility of Wireless Network Simulations with Experiment Automation
L. Felipe Perrone, Christopher J. Kenna, Bryan C. ...