Sciweavers

5539 search results - page 28 / 1108
» What can be computed locally
Sort
View
IPPS
2008
IEEE
14 years 4 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
LCN
2008
IEEE
14 years 4 months ago
What's new? Message reduction in sensor networks using events
—Observing the environment is the raison d’ ˆetre of sensor networks, but the precise reconstruction of the measured process requires too many messages for a low power sensor ...
Andreas Köpke, Adam Wolisz
EACL
2006
ACL Anthology
13 years 11 months ago
What's There to Talk About? A Multi-Modal Model of Referring Behavior in the Presence of Shared Visual Information
This paper describes the development of a rule-based computational model that describes how a feature-based representation of shared visual information combines with linguistic cu...
Darren Gergle
DIGRA
2005
Springer
14 years 3 months ago
Games for Learning: Are Schools Ready for What's to Come?
Games Studies is still a relatively new field where much basic research remains to be done. This study asks K-12 teachers about their attitudes towards the use of games for teachi...
Katrin Becker, Michele Jacobsen
CHI
2008
ACM
14 years 10 months ago
What to do when search fails: finding information by association
Sometimes people cannot remember the names or locations of things on their computer, but they can remember what other things are associated with them. We created Feldspar, the fir...
Duen Horng Chau, Brad A. Myers, Andrew Faulring