Sciweavers

460 search results - page 53 / 92
» Time studies as a tool for (computer science) education rese...
Sort
View
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Deriving Specifications of Dependable Systems: toward a Method
Abstract--This paper proposes a method for deriving formal specifications of systems. To accomplish this task we pass through a non trivial number of steps, concepts and tools wher...
Manuel Mazzara
CHI
2000
ACM
14 years 1 days ago
Face to interface: facial affect in (hu)man and machine
Facial expression of emotion (or "facial affect") is rapidly becoming an area of intense interest in the computer science and interaction design communities. Ironically,...
Diane J. Schiano, Sheryl M. Ehrlich, Krisnawan Rah...
STOC
2012
ACM
193views Algorithms» more  STOC 2012»
11 years 10 months ago
A new point of NP-hardness for unique games
d abstract; full version begins on page 13) Ryan O’Donnell∗ John Wright† November 2, 2011 We show that distinguishing 1 2 -satisfiable Unique-Games instances from (3 8 + )-...
Ryan O'Donnell, John Wright
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
CORR
2002
Springer
92views Education» more  CORR 2002»
13 years 7 months ago
Source Routing and Scheduling in Packet Networks
We study routing and scheduling in packet-switched networks. We assume an adversary that controls the injection time, source, and destination for each packet injected. A set of pat...
Matthew Andrews, Antonio Fernández, Ashish ...