Sciweavers

1734 search results - page 180 / 347
» What works
Sort
View
MSR
2005
ACM
14 years 4 months ago
Towards a taxonomy of approaches for mining of source code repositories
Source code version repositories provide a treasure of information encompassing the changes introduced in the system throughout its evolution. These repositories are typically man...
Huzefa H. Kagdi, Michael L. Collard, Jonathan I. M...
ASIACRYPT
2007
Springer
14 years 2 months ago
On Tweaking Luby-Rackoff Blockciphers
Abstract. Tweakable blockciphers, first formalized by Liskov, Rivest, and Wagner [13], are blockciphers with an additional input, the tweak, which allows for variability. An open p...
David Goldenberg, Susan Hohenberger, Moses Liskov,...
AICOM
2002
103views more  AICOM 2002»
13 years 10 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
PUC
2002
91views more  PUC 2002»
13 years 10 months ago
Designing Leisure Applications for the Mundane Car-Commute
: Commuting by car from home to work can be very time consuming. We have conducted a study to explore what people are doing, and want to do, while commuting. People use their time ...
Karl-Petter Ðkesson, Andreas Nilsson
WWW
2004
ACM
14 years 11 months ago
Understanding user goals in web search
Previous work on understanding user web search behavior has focused on how people search and what they are searching for, but not why they are searching. In this paper, we describ...
Daniel E. Rose, Danny Levinson