Sciweavers

SIGCSE
2002
ACM
97views Education» more  SIGCSE 2002»
13 years 4 months ago
Women in computing around the world
This technical report describes the participation of women in computing in more than 30 countries, by focussing on participation at undergraduate level. A brief discussion covers ...
Vashti Galpin
IJFCS
2007
93views more  IJFCS 2007»
13 years 4 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
JSAT
2008
90views more  JSAT 2008»
13 years 4 months ago
2006 and 2007 Max-SAT Evaluations: Contributed Instances
In this technical report we briefly describe the instances submitted to the 2006 and 2007 MaxSAT Evaluations. First, we introduce the instances that can be directly encoded as Max...
Federico Heras, Javier Larrosa, Simon de Givry, Th...
CORR
2006
Springer
143views Education» more  CORR 2006»
13 years 4 months ago
Efficient Route Tracing from a Single Source
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as a...
Benoit Donnet, Philippe Raoult, Timur Friedman
CORR
2008
Springer
117views Education» more  CORR 2008»
13 years 4 months ago
Time Warp Edit Distance
: This technical report details a family of time warp distances on the set of discrete time series. This family is constructed as an editing distance whose elementary operations ap...
Pierre-Francois Marteau
UIST
1997
ACM
13 years 8 months ago
Solving Linear Arithmetic Constraints for User Interface Applications
Linear equality and inequality constraints arise naturally in specifying many aspects of user interfaces, such as requiring that one window be to the left of another, requiring th...
Alan Borning, Kim Marriott, Peter J. Stuckey, Yi X...
ISPEC
2005
Springer
13 years 9 months ago
Secure Software Delivery and Installation in Embedded Systems
ded abstract of this technical report appeared in the Proceedings of the First Information Security Practice and Experience Conference (ISPEC 2005) [AHS05].
André Adelsbach, Ulrich Huber, Ahmad-Reza S...