Sciweavers

2144 search results - page 166 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
SIGMETRICS
2004
ACM
107views Hardware» more  SIGMETRICS 2004»
15 years 10 months ago
On zone-balancing of peer-to-peer networks: analysis of random node join
Balancing peer-to-peer graphs, including zone-size distributions, has recently become an important topic of peer-topeer (P2P) research [1], [2], [6], [19], [31], [36]. To bring an...
Xiaoming Wang, Yueping Zhang, Xiafeng Li, Dmitri L...
EWCBR
2004
Springer
15 years 8 months ago
Using CBR for Semantic Analysis of Software Specifications
Abstract. Helping software designers in their task implies the development of tools with intelligent capabilities. One such capability is the integration of natural language unders...
Nuno Seco, Paulo Gomes, Francisco C. Pereira
SEFM
2005
IEEE
15 years 10 months ago
Formal Analysis of Human-computer Interaction using Model-checking
Experiments with simulators allow psychologists to better understand the causes of human errors and build models of cognitive processes to be used in Human Reliability Assessment ...
Antonio Cerone, Peter A. Lindsay, Simon Connelly
ATAL
2000
Springer
15 years 9 months ago
Plan Analysis for Autonomous Sociological Agents
Abstract. This paper is concerned with the problem of how effective social interaction arises from individual social action and mind. The need to study the individual social mind s...
Michael Luck, Mark d'Inverno
ASIACRYPT
2006
Springer
15 years 8 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...