Sciweavers

1557 search results - page 61 / 312
» What can we do with a Solution
Sort
View
CSREASAM
2006
13 years 9 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
SAT
2009
Springer
113views Hardware» more  SAT 2009»
14 years 2 months ago
Clause-Learning Algorithms with Many Restarts and Bounded-Width Resolution
Abstract. We offer a new understanding of some aspects of practical SAT-solvers that are based on DPLL with unit-clause propagation, clause-learning, and restarts. On the theoreti...
Albert Atserias, Johannes Klaus Fichte, Marc Thurl...
PLDI
2005
ACM
14 years 1 months ago
Jungloid mining: helping to navigate the API jungle
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
David Mandelin, Lin Xu, Rastislav Bodík, Do...
ICDCSW
2007
IEEE
14 years 2 months ago
A Context-aware Reminding System for Daily Activities of Dementia Patients
Older people with dementia often decline in short-term memory and forget what to do next to complete their activities of daily living (ADLs), such as tea-making and toothbrushing....
Hua Si, Seung Jin Kim, Nao Kawanishi, Hiroyuki Mor...
IJSE
2010
138views more  IJSE 2010»
13 years 5 months ago
Modeling the Experience of Emotion
Affective computing has proven to be a viable field of research comprised of a large number of multidisciplinary researchers resulting in work that is widely published. The majori...
Joost Broekens