Sciweavers

252 search results - page 37 / 51
» Why Do Upgrades Fail and What Can We Do about It
Sort
View
AI
2008
Springer
13 years 7 months ago
The well-designed child
This article is inspired by recent psychological studies confirming that a child is not born a blank slate but has important innate capabilities. An important part of the "le...
John McCarthy
FPLAY
2008
13 years 9 months ago
A framework for games literacy and understanding games
Based on research that studied the challenges and difficulties faced by students taking games studies and game design courses, we propose that, while many students enrolled in gam...
José Pablo Zagal
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
On the Tails of the Distribution of the Sum of Lognormals
—Finding the distribution of the sum of lognormal We assume in this paper that the terms Yi are independent. The random variables is an important mathematical problem in probabil...
Sebastien S. Szyszkowicz, Halim Yanikomeroglu
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
SOCO
2008
Springer
13 years 7 months ago
Interface Composition for Web Service Intermediaries
Abstract. The use of XML as a format for message exchange makes Web services well suited for composition of heterogeneous components. However, since clients must manage differences...
Sara Forghanizadeh, Eric Wohlstadter