Sciweavers

7839 search results - page 1513 / 1568
» What's Clicking What
Sort
View
JASIS
2000
262views more  JASIS 2000»
13 years 11 months ago
The conduit metaphor and the nature and politics of information studies
: This article examines information theory from the aspect of its "conduit metaphor." A historical approach and a close reading of certain texts by Warren Weaver and Nor...
Ronald E. Day
JETAI
2000
302views more  JETAI 2000»
13 years 11 months ago
Consciousness, intentionality and intelligence: some foundational issues for artificial intelligence
: We present three fundamental questions concerning minds. These are about consciousness, intentionality and intelligence. After we present the fundamental framework that has shape...
Murat Aydede, Guven Guzeldere
JOC
2000
95views more  JOC 2000»
13 years 11 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
JSS
2000
85views more  JSS 2000»
13 years 11 months ago
An experimental comparison of reading techniques for defect detection in UML design documents
The basic motivation for software inspections is to detect and remove defects before they propagate to subsequent development phases where their detection and removal becomes more...
Oliver Laitenberger, Colin Atkinson, Maud Schlich,...
JUCS
2000
102views more  JUCS 2000»
13 years 11 months ago
Towards Two-Level Formal Modeling of Computer-Based Systems
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
Gabor Karsai, Greg Nordstrom, Ákos Lé...
« Prev « First page 1513 / 1568 Last » Next »