Sciweavers

2642 search results - page 3 / 529
» The development of Chez Scheme
Sort
View
WOTE
2010
13 years 5 months ago
Aperio: High Integrity Elections for Developing Countries
This article presents an ‘end-to-end’ integrity verification mechanism for use in minimally equipped secret paper-ballot election environments. The scheme presented in this pa...
Aleksander Essex, Jeremy Clark, Carlisle Adams
MSV
2007
13 years 8 months ago
Analysis of a Numerical Scheme for Bioheat Simulations of Cryosurgery and its Experimental Validation on a Phantom Material
- As part of an ongoing effort to develop computerized planning tools for cryosurgery, the current study focuses on validating a numerical technique for bioheat transfer simulation...
Michael R. Rossi, Yoed Rabin
INTERACT
2003
13 years 8 months ago
Classification of Usability Problems (CUP) Scheme
: Defect classification can improve product quality and motivate process improvement. Several defect classification schemes have been developed and used with good results in softwa...
Ebba Thora Hvannberg, Effie Lai-Chong Law
DBSEC
2010
137views Database» more  DBSEC 2010»
13 years 8 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
ICFP
2007
ACM
14 years 7 months ago
Experience report: scheme in commercial web application development
Over the past year Untyped has developed some 40'000 lines of Scheme code for a variety of web-based applications, which receive over 10'000 hits a day. This is, to our ...
Noel Welsh, David Gurnell